Lucene search

K
nvd[email protected]NVD:CVE-2023-33308
HistoryJul 26, 2023 - 3:15 p.m.

CVE-2023-33308

2023-07-2615:15:10
CWE-121
CWE-787
web.nvd.nist.gov
fortinet fortios
fortiproxy
stack-based overflow
remote attacker
arbitrary code execution
command execution
crafted packets
proxy policies
firewall policies
deep packet inspection
full packet inspection

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.4%

A stack-based overflow vulnerability [CWE-124] in Fortinet FortiOS version 7.0.0 through 7.0.10 and 7.2.0 through 7.2.3 and FortiProxy version 7.0.0 through 7.0.9 and 7.2.0 through 7.2.2 allows a remote unauthenticated attacker to execute arbitrary code or command via crafted packets reaching proxy policies or firewall policies with proxy mode alongside deep or full packet inspection.

Affected configurations

NVD
Node
fortinetfortiproxyRange7.0.07.0.9
OR
fortinetfortiproxyMatch7.2.0
OR
fortinetfortiproxyMatch7.2.1
OR
fortinetfortiproxyMatch7.2.2
OR
fortinetfortiosRange7.0.07.0.10
OR
fortinetfortiosRange7.2.07.2.3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.4%