FortiOS/FortiProxy SSLVPN Tunnel Mode IP Spoofing (CWE-345) 7.07.4
CVE-2023-45586 Published on May 14, 2024
An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.
Vulnerability Analysis
CVE-2023-45586 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.
Weakness Type
Insufficient Verification of Data Authenticity
The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Products Associated with CVE-2023-45586
stack.watch emails you whenever new vulnerabilities are published in Fortinet FortiProxy or Fortinet FortiOS. Just hit a watch button to start following.
Affected Versions
Fortinet FortiProxy:- Version 7.4.0, <= 7.4.1 is affected.
- Version 7.2.0, <= 7.2.7 is affected.
- Version 7.0.0, <= 7.0.13 is affected.
- Version 2.0.0, <= 2.0.14 is affected.
- Version 7.4.0, <= 7.4.1 is affected.
- Version 7.2.0, <= 7.2.7 is affected.
- Version 7.0.0, <= 7.0.12 is affected.
- Version 6.4.0, <= 6.4.15 is affected.
- Version 6.2.0, <= 6.2.16 is affected.
- Version 7.4.0, <= 7.4.1 is affected.
- Version 7.2.0, <= 7.2.7 is affected.
- Version 7.4.0, <= 7.4.1 is affected.
- Version 7.0.0 and below 7.0.12 is affected.
- Version 6.4.0, <= 6.4.15 is affected.
- Version 6.2.0, <= 6.2.16 is affected.
- Version 7.4.0, <= 7.4.1 is affected.
- Version 7.2.0, <= 7.2.7 is affected.
- Version 7.0.0, <= 7.0.13 is affected.
- Version 2.0.0, <= 2.0.14 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.