FortiOS/FortiProxy SSLVPN Tunnel Mode IP Spoofing (CWE-345) 7.07.4
CVE-2023-45586 Published on May 14, 2024

An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.

NVD

Vulnerability Analysis

CVE-2023-45586 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
CHANGED
Confidentiality Impact:
NONE
Integrity Impact:
LOW
Availability Impact:
NONE

Weakness Type

Insufficient Verification of Data Authenticity

The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.


Products Associated with CVE-2023-45586

stack.watch emails you whenever new vulnerabilities are published in Fortinet FortiProxy or Fortinet FortiOS. Just hit a watch button to start following.

 
 

Affected Versions

Fortinet FortiProxy: Fortinet FortiOS: fortinet fortios: fortinet fortios: fortinet fortiproxy: fortinet fortios: fortinet fortios: fortinet fortios: fortinet fortiproxy: fortinet fortiproxy: fortinet fortiproxy: fortinet fortiproxy:

Exploit Probability

EPSS
0.22%
Percentile
43.89%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.