Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-41675


A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection.


Published

2023-10-10T17:15:12.620

Last Modified

2024-11-21T08:21:27.890

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-416
  • Type: Primary
    CWE-416

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application fortinet fortiproxy ≤ 7.0.8 Yes
Application fortinet fortiproxy 7.2.0 Yes
Application fortinet fortiproxy 7.2.1 Yes
Application fortinet fortiproxy 7.2.2 Yes
Operating System fortinet fortios ≤ 7.0.10 Yes
Operating System fortinet fortios ≤ 7.2.4 Yes

References