CVE-2023-45586

MEDIUM

Fortinet Fortiproxy < 2.0.12 - Data Authenticity Bypass

Title source: rule
STIX 2.1

Description

An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.

Scores

CVSS v3 5.0
EPSS 0.0022
EPSS Percentile 43.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-345
Status published
Products (6)
fortinet/fortios 7.4.0
fortinet/fortios 7.4.1
fortinet/fortios 6.2.0 - 6.2.16
fortinet/fortiproxy 7.4.0
fortinet/fortiproxy 7.4.1
fortinet/fortiproxy 2.0.0 - 2.0.12
Published May 14, 2024
Tracked Since Feb 18, 2026