First published: Tue Jul 09 2024(Updated: )
An incorrect parsing of numbers with different radices vulnerability [CWE-1389] in FortiOS and FortiProxy IP address validation feature may permit an unauthenticated attacker to bypass the IP blocklist via crafted requests.
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | >=7.4.0<=7.4.3 | |
FortiOS | >=7.2.0<=7.2.8 | |
FortiOS | >=7.0 | |
Fortinet FortiProxy SSL VPN webmode | >=7.4.0<=7.4.3 | |
Fortinet FortiProxy SSL VPN webmode | >=7.2 | |
Fortinet FortiProxy SSL VPN webmode | >=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-446 is considered high due to the potential for unauthenticated attackers to bypass IP blocklists.
To fix FG-IR-23-446, upgrade FortiOS or FortiProxy to version 7.4.4 or later, or version 7.2.9 for affected versions.
FG-IR-23-446 affects FortiOS versions 7.0 to 7.4.3 and FortiProxy versions up to 7.4.3.
Yes, FG-IR-23-446 can be exploited remotely by sending crafted requests to the affected FortiOS or FortiProxy installations.
No, exploitation of FG-IR-23-446 does not require authentication, making it particularly dangerous.