5
CVE-2023-45586
- EPSS 0.22%
- Veröffentlicht 14.05.2024 17:15:24
- Zuletzt bearbeitet 21.11.2024 08:27:00
- Quelle psirt@fortinet.com
- CVE-Watchlists
- Unerledigt
An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fortinet ≫ Fortiproxy Version >= 2.0.0 <= 2.0.12
Fortinet ≫ Fortiproxy Version >= 7.0.0 < 7.0.14
Fortinet ≫ Fortiproxy Version >= 7.2.0 < 7.2.8
Fortinet ≫ Fortiproxy Version7.4.0
Fortinet ≫ Fortiproxy Version7.4.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.22% | 0.441 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5 | 3.1 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
|
| psirt@fortinet.com | 5 | 3.1 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
|
CWE-345 Insufficient Verification of Data Authenticity
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.