First published: Tue Dec 12 2023(Updated: )
An improper access control vulnerability [CWE-284] in FortiOS and FortiProxy may allow a remote unauthenticated attacker to bypass the firewall deny geolocalisation policy via timing the bypass with a GeoIP database update.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | =. | |
Fortinet FortiOS IPS Engine | >=7.0 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
Fortinet FortiProxy | >=7.2.0<=7.2.3 | |
Fortinet FortiProxy | >=7.0.0<=7.0.9 | |
Fortinet FortiProxy | >=2.0.0<=2.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-23-432 vulnerability has a critical severity level due to its potential for unauthorized access.
To fix FG-IR-23-432, update FortiOS to version 7.2.1 or later, or FortiProxy to version 7.2.4 or later.
FG-IR-23-432 affects FortiOS and FortiProxy versions prior to the specified remedy versions.
FG-IR-23-432 is an improper access control vulnerability classified under CWE-284.
Yes, FG-IR-23-432 can be exploited by a remote unauthenticated attacker.