First published: Tue Apr 09 2024(Updated: )
An insufficiently protected credentials vulnerability (CWE-522) in FortiOS and FortiProxy may allow an attacker to obtain the administrator cookie in rare and specific conditions, via tricking the administrator into visiting a malicious attacker-controlled website through the SSL-VPN.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.1 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.6 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.12 | |
Fortinet FortiOS IPS Engine | >=6.4.0<=6.4.14 | |
Fortinet FortiOS IPS Engine | >=6.2.0<=6.2.15 | |
Fortinet FortiOS IPS Engine | >=6.0 | |
Fortinet FortiProxy | >=7.4.0<=7.4.1 | |
Fortinet FortiProxy | >=7.2.0<=7.2.7 | |
Fortinet FortiProxy | >=7.0.0<=7.0.13 | |
Fortinet FortiProxy | >=2.0 | |
Fortinet FortiProxy | >=1.2 | |
Fortinet FortiProxy | >=1.1 | |
Fortinet FortiProxy | >=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-23-493 vulnerability is classified with a medium severity rating.
To fix FG-IR-23-493, update FortiOS or FortiProxy to the remedial versions or later: FortiOS 7.4.2, 7.2.7, 7.0.13, 6.4.15, 6.2.16, and FortiProxy 7.4.2, 7.2.8, 7.0.14.
Affected versions of FortiOS include 7.4.0 to 7.4.1, 7.2.0 to 7.2.6, 7.0.0 to 7.0.12, 6.4.0 to 6.4.14, and 6.2.0 to 6.2.15.
Yes, FortiProxy versions 7.4.0 to 7.4.1, 7.2.0 to 7.2.7, and 7.0.0 to 7.0.13 are affected by FG-IR-23-493.
FG-IR-23-493 is classified as an insufficiently protected credentials vulnerability, specifically CWE-522.