CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:U/RC:R
EPSS
Percentile
39.5%
An improper certificate validation vulnerability [CWE-295] in FortiOS 7.2.0 through 7.2.3, 7.0.0 through 7.0.7, 6.4 all versions, 6.2Β all versions, 6.0Β all versions and FortiProxy 7.0.0 through 7.0.6, 2.0Β all versions, 1.2Β all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiOS/FortiProxy device and remote servers hosting threat feeds (when the latter are configured as Fabric connectors in FortiOS/FortiProxy)
[
{
"vendor": "Fortinet",
"product": "FortiProxy",
"defaultStatus": "unaffected",
"versions": [
{
"versionType": "semver",
"version": "7.0.0",
"lessThanOrEqual": "7.0.6",
"status": "affected"
},
{
"versionType": "semver",
"version": "2.0.0",
"lessThanOrEqual": "2.0.11",
"status": "affected"
},
{
"versionType": "semver",
"version": "1.2.0",
"lessThanOrEqual": "1.2.13",
"status": "affected"
}
]
},
{
"vendor": "Fortinet",
"product": "FortiOS",
"defaultStatus": "unaffected",
"versions": [
{
"versionType": "semver",
"version": "7.2.0",
"lessThanOrEqual": "7.2.3",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.0.0",
"lessThanOrEqual": "7.0.7",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.4.0",
"lessThanOrEqual": "6.4.11",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.2.0",
"lessThanOrEqual": "6.2.12",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.0.0",
"lessThanOrEqual": "6.0.16",
"status": "affected"
}
]
}
]