Lucene search

K
cve[email protected]CVE-2023-33299
HistoryJun 23, 2023 - 8:15 a.m.

CVE-2023-33299

2023-06-2308:15:09
CWE-502
web.nvd.nist.gov
31
cve-2023-33299
fortinet
fortinac
deserialization
code execution
security vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.2%

A deserialization of untrusted data in Fortinet FortiNAC below 7.2.1, below 9.4.3, below 9.2.8 and all earlier versions of 8.x allows attacker to execute unauthorized code or commands via specifically crafted request on inter-server communication port. Note FortiNAC versions 8.x will not be fixed.

Affected configurations

NVD
Node
fortinetfortinacRange8.5.08.5.4
OR
fortinetfortinacRange8.6.08.6.5
OR
fortinetfortinacRange8.7.08.7.6
OR
fortinetfortinacRange8.8.08.8.11
OR
fortinetfortinacRange9.1.09.1.9
OR
fortinetfortinacRange9.2.09.2.7
OR
fortinetfortinacMatch7.2.0
OR
fortinetfortinacMatch7.2.1
OR
fortinetfortinacMatch8.3.7
OR
fortinetfortinacMatch9.4.0
OR
fortinetfortinacMatch9.4.1
OR
fortinetfortinacMatch9.4.2

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiNAC",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "9.4.0",
        "lessThanOrEqual": "9.4.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "9.2.0",
        "lessThanOrEqual": "9.2.7",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "9.1.0",
        "lessThanOrEqual": "9.1.9",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "8.8.0",
        "lessThanOrEqual": "8.8.11",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "8.7.0",
        "lessThanOrEqual": "8.7.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "8.6.0",
        "lessThanOrEqual": "8.6.5",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "8.5.0",
        "lessThanOrEqual": "8.5.4",
        "status": "affected"
      },
      {
        "version": "8.3.7",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.1",
        "status": "affected"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.2%

Related for CVE-2023-33299