Lucene search

K
fortinetFortiGuard LabsFG-IR-22-073
HistorySep 06, 2022 - 12:00 a.m.

Protect

2022-09-0600:00:00
FortiGuard Labs
www.fortiguard.com
27
fortios
communication source
vulnerability
remote attacker
tcp requests
firewall policy
inspection mode
security profile
flooding

EPSS

0.001

Percentile

40.4%

An improper verification of source of a communication channel vulnerability [CWE-940] in FortiOS may allow a remote and unauthenticated attacker to trigger the sending of “blocked page” HTML data to an arbitrary victim via crafted TCP requests, potentially flooding the victim. This is possible only if at least a firewall policy has inspection mode set to flow-based (default), AND at least a Security Profile is enabled (Web Filter, AntiVirus, IPS, DLP, Application Control, SSL, File filter).

EPSS

0.001

Percentile

40.4%

Related for FG-IR-22-073