Lucene search

K
cveFortinetCVE-2023-27997
HistoryJun 13, 2023 - 9:15 a.m.

CVE-2023-27997

2023-06-1309:15:16
CWE-787
CWE-122
fortinet
web.nvd.nist.gov
745
In Wild
27
cve-2023-27997
fortios
heap-based
buffer overflow
vulnerability
cwe-122
nvd
security
ssl-vpn
remote attacker
arbitrary code
arbitrary commands

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.107

Percentile

95.2%

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.

Affected configurations

Nvd
Node
fortinetfortiproxyRange1.1.0–1.1.6
OR
fortinetfortiproxyRange1.2.0–1.2.13
OR
fortinetfortiproxyRange2.0.0–2.0.12
OR
fortinetfortiproxyRange7.0.0–7.0.9
OR
fortinetfortiproxyRange7.2.0–7.2.3
OR
fortinetfortiosRange6.0.0–6.0.16
OR
fortinetfortiosRange6.2.0–6.2.13
OR
fortinetfortiosRange6.4.0–6.4.12
OR
fortinetfortiosRange7.0.0–7.0.11
OR
fortinetfortiosRange7.2.0–7.2.4
Node
fortinetfortiosRange6.0.12–6.0.16
OR
fortinetfortiosRange6.2.9–6.2.13
OR
fortinetfortiosMatch6.0.10
OR
fortinetfortiosMatch6.2.4
OR
fortinetfortiosMatch6.2.6
OR
fortinetfortiosMatch6.2.7
OR
fortinetfortiosMatch6.4.2
OR
fortinetfortiosMatch6.4.6
OR
fortinetfortiosMatch6.4.8
OR
fortinetfortiosMatch6.4.10
OR
fortinetfortiosMatch6.4.12
OR
fortinetfortiosMatch7.0.5
OR
fortinetfortiosMatch7.0.10
AND
fortinetfortigate_6000Match-
OR
fortinetfortigate_7000Match-
VendorProductVersionCPE
fortinetfortiproxy*cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
fortinetfortios*cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
fortinetfortios6.0.10cpe:2.3:o:fortinet:fortios:6.0.10:*:*:*:*:*:*:*
fortinetfortios6.2.4cpe:2.3:o:fortinet:fortios:6.2.4:*:*:*:*:*:*:*
fortinetfortios6.2.6cpe:2.3:o:fortinet:fortios:6.2.6:*:*:*:*:*:*:*
fortinetfortios6.2.7cpe:2.3:o:fortinet:fortios:6.2.7:*:*:*:*:*:*:*
fortinetfortios6.4.2cpe:2.3:o:fortinet:fortios:6.4.2:*:*:*:*:*:*:*
fortinetfortios6.4.6cpe:2.3:o:fortinet:fortios:6.4.6:*:*:*:*:*:*:*
fortinetfortios6.4.8cpe:2.3:o:fortinet:fortios:6.4.8:*:*:*:*:*:*:*
fortinetfortios6.4.10cpe:2.3:o:fortinet:fortios:6.4.10:*:*:*:*:*:*:*
Rows per page:
1-10 of 151

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiOS-6K7K",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "version": "7.0.10",
        "status": "affected"
      },
      {
        "version": "7.0.5",
        "status": "affected"
      },
      {
        "version": "6.4.12",
        "status": "affected"
      },
      {
        "version": "6.4.10",
        "status": "affected"
      },
      {
        "version": "6.4.8",
        "status": "affected"
      },
      {
        "version": "6.4.6",
        "status": "affected"
      },
      {
        "version": "6.4.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.9",
        "lessThanOrEqual": "6.2.13",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.6",
        "lessThanOrEqual": "6.2.7",
        "status": "affected"
      },
      {
        "version": "6.2.4",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.0.12",
        "lessThanOrEqual": "6.0.16",
        "status": "affected"
      },
      {
        "version": "6.0.10",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Fortinet",
    "product": "FortiProxy",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.9",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "2.0.0",
        "lessThanOrEqual": "2.0.12",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "1.2.0",
        "lessThanOrEqual": "1.2.13",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "1.1.0",
        "lessThanOrEqual": "1.1.6",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Fortinet",
    "product": "FortiOS",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.4",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.11",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.12",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.13",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.0.0",
        "lessThanOrEqual": "6.0.16",
        "status": "affected"
      }
    ]
  }
]

Social References

More

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.107

Percentile

95.2%