CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
73.1%
A stack-based overflow vulnerability [CWE-124] in Fortinet FortiOS version 7.0.0 through 7.0.10 and 7.2.0 through 7.2.3 and FortiProxy version 7.0.0 through 7.0.9 and 7.2.0 through 7.2.2 allows a remote unauthenticated attacker to execute arbitrary code or command via crafted packets reaching proxy policies or firewall policies with proxy mode alongside deep or full packet inspection.
Vendor | Product | Version | CPE |
---|---|---|---|
fortinet | fortiproxy | * | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* |
fortinet | fortiproxy | 7.2.0 | cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:* |
fortinet | fortiproxy | 7.2.1 | cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:* |
fortinet | fortiproxy | 7.2.2 | cpe:2.3:a:fortinet:fortiproxy:7.2.2:*:*:*:*:*:*:* |
fortinet | fortios | * | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
[
{
"vendor": "Fortinet",
"product": "FortiProxy",
"defaultStatus": "unaffected",
"versions": [
{
"versionType": "semver",
"version": "7.2.0",
"lessThanOrEqual": "7.2.2",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.0.0",
"lessThanOrEqual": "7.0.9",
"status": "affected"
}
]
},
{
"vendor": "Fortinet",
"product": "FortiOS",
"defaultStatus": "unaffected",
"versions": [
{
"versionType": "semver",
"version": "7.2.0",
"lessThanOrEqual": "7.2.3",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.0.0",
"lessThanOrEqual": "7.0.10",
"status": "affected"
}
]
}
]