CERT-In Vulnerability Note
CIVN-2023-0310
Multiple Vulnerabilities in Fortinet Products
Original Issue Date:October 18, 2023
Severity Rating: HIGH
Software Affected
- FortiClientLinux 6.2 all versions
- FortiClientLinux 6.4 all versions
- FortiClientLinux 7.0 all versions
- FortiClientLinux 7.2 version 7.2.0
- FortiClientMac 6.2 all versions
- FortiClientMac 6.4 all versions
- FortiClientMac 7.0 all versions
- FortiClientMac 7.2 version 7.2.0 through 7.2.1
- FortiClientWindows 6.2 all versions
- FortiClientWindows 6.4 all versions
- FortiClientWindows 7.0 all versions
- FortiClientWindows 7.2 version 7.2.0
- FortiMail 6.0 all versions
- FortiMail 6.2 all versions
- FortiMail 6.4 version 6.4.0 through 6.4.7
- FortiMail 7.0 version 7.0.0 through 7.0.5
- FortiMail 7.2 version 7.2.0 through 7.2.2
- FortiOS version 7.0.0 through 7.0.12
- FortiOS version 7.2.0 through 7.2.5
- FortiOS version 7.4.0
- FortiProxy version 7.0.0 through 7.0.8
- FortiProxy version 7.2.0 through 7.2.2
Overview
Multiple Vulnerabilities have been reported in Fortinet Products which could allow a remote attacker to execute data manipulation, security restriction bypass, denial of service condition, sensitive information disclosure and remote code execution on the targeted system.
Description
Multiple vulnerabilities exist in Fortinet Products due to improper authorization in WEB UI component, incorrect authorization in FortiMail webmail, improper neutralization of input during web page generation in FortiMail, use after free in FortiOS & FortiProxy, improper access control in FortiOS REST API component, use of GET request method with sensitive query strings in the FortiOS SSL VPN component, improper neutralization of script-related HTML tags in a web page in FortiOS. An attacker could exploit these vulnerabilities by sending a specially-crafted request to the targeted system.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute data manipulation, security restriction bypass, denial of service condition, sensitive information disclosure and remote code execution on the targeted system.
Solution
Apply appropriate updates as mentioned:
https://www.fortiguard.com/psirt/FG-IR-23-104
https://www.fortiguard.com/psirt/FG-IR-23-120
https://www.fortiguard.com/psirt/FG-IR-23-139
https://www.fortiguard.com/psirt/FG-IR-23-184
https://www.fortiguard.com/psirt/FG-IR-23-194
https://www.fortiguard.com/psirt/FG-IR-23-202
https://www.fortiguard.com/psirt/FG-IR-22-235
https://www.fortiguard.com/psirt/FG-IR-23-318
Vendor Information
FortiGuard
https://www.fortiguard.com/psirt/FG-IR-23-104
https://www.fortiguard.com/psirt/FG-IR-23-120
https://www.fortiguard.com/psirt/FG-IR-23-139
https://www.fortiguard.com/psirt/FG-IR-23-184
https://www.fortiguard.com/psirt/FG-IR-23-194
https://www.fortiguard.com/psirt/FG-IR-23-202
https://www.fortiguard.com/psirt/FG-IR-22-235
https://www.fortiguard.com/psirt/FG-IR-23-318
CVE Name
CVE-2023-33301
CVE-2023-36555
CVE-2023-36556
CVE-2023-36637
CVE-2023-37935
CVE-2023-37939
CVE-2023-41675
CVE-2023-41841
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|