First published: Thu Feb 08 2024(Updated: )
An improper certificate validation vulnerability [CWE-295] in FortiOS may allow an unauthenticated attacker in a Man-in-the-Middle position to decipher and alter the FortiLink communication channel between the FortiOS device and a FortiSwitch instance.
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | >=7.4.0<=7.4.1 | |
FortiOS | >=7.2.0<=7.2.6 | |
FortiOS | >=7.0.0<=7.0.15 | |
FortiOS | >=6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-301 is considered critical due to the potential for unauthenticated attackers to exploit the vulnerability.
To fix FG-IR-23-301, upgrade FortiOS to version 7.4.2 or later, or to version 7.2.7 or later.
FG-IR-23-301 affects FortiOS versions from 7.4.0 to 7.4.1, from 7.2.0 to 7.2.6, and all versions up to 7.0.15 and 6.4.
Yes, FG-IR-23-301 can be exploited remotely by an attacker positioned in a Man-in-the-Middle scenario.
FG-IR-23-301 is categorized as an improper certificate validation vulnerability, listed under CWE-295.