You are currently viewing #FortiGat_Vulnerability – March 2023

#FortiGat_Vulnerability – March 2023

Fortinet has released security updates addressing several vulnerabilities in multiple products.

The addressed vulnerabilities could allow the attacker to execute arbitrary code,cause a denial of service attack, escalate privileges, or disclose information on the affected systems.

List Of CVEs:

CVE Number
CVE-2023-25611
CVE-2023-23776
CVE-2022-29056
CVE-2022-27490
CVE-2022-40676
CVE-2022-39953
CVE-2022-45861
CVE-2022-41328
CVE-2023-25610
CVE-2022-42476
CVE-2022-41329
CVE-2022-41333
CVE-2023-25605
CVE-2022-39951
CVE-2022-22297

Effected Productions and Versions :

FortiOS & FortiProxy – Access of NULL pointer in SSLVPNd

Advisory Summary:

NULL pointer in FortiOS & FortiProxy SSLVPNd

Affected Products:

FortiOS version 7.2.0 through 7.2.3 FortiOS version 7.0.0 through 7.0.9 FortiOS version 6.4.0 through 6.4.11 FortiOS 6.2 all versions FortiProxy version 7.2.0 through 7.2.1 FortiProxy version 7.0.0 through 7.0.7 FortiProxy version 2.0.0 through 2.0.11 FortiProxy 1.2 all versions FortiProxy 1.1 all versions

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-22-477

CVSS Score:

6.4

FortiOS / FortiProxy – Path traversal vulnerability allows VDOM escaping

Advisory Summary:

Path traversal vulnerability in FortiOS & FortiProxy

Affected Products:

FortiOS version 7.2.0 through 7.2.3 FortiOS version 7.0.0 through 7.0.8 FortiOS version 6.4.0 through 6.4.11 FortiOS version 6.2.0 through 6.2.12 FortiProxy version 7.2.0 through 7.2.1 FortiProxy version 7.0.0 through 7.0.7 FortiProxy version 2.0.0 through 2.0.11 FortiProxy version 1.2.0 through 1.2.13 FortiProxy version 1.1.0 through 1.1.6 Note: Impact on FortiProxy 7.0.x, 2.0.x, 1.2.x, 1.1.x is minor as it does not have VDOMs

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-22-401

CVSS Score:

7.8

FortiAuthenticator, FortiDeceptor & FortiMail – Improper restriction over excessive authentication attempts

Advisory Summary:

Partial denial of service using excessive authentication attempts on FortiAuthenticator, FortiDeceptor & FortiMail

Affected Products:

FortiAuthenticator version 6.4  all versions FortiAuthenticator version 6.3  all versions FortiAuthenticator version 6.2  all versions FortiAuthenticator version 6.1  all versions FortiAuthenticator version 6.0  all versions FortiAuthenticator version 5.5  all versions FortiAuthenticator version 5.4  all versions FortiDeceptor version 3.1  all versions FortiDeceptor version 3.0  all versions FortiDeceptor version 2.1 all versions FortiDeceptor version 2.0  all versions FortiDeceptor version 1.1  all versions FortiDeceptor version 1.0  all versions FortiMail version 6.4.0 FortiMail version 6.2.1 through 6.2.4 FortiMail version 6.0.0 through 6.0.9

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-20-078

CVSS Score:

3.5

FortiOS / FortiProxy – Unauthenticated access to static files containing logging information

Advisory Summary:

Information disclosure in FortiOS & FortiProxy

Affected Products:

FortiProxy version 7.2.0 through 7.2.2 FortiProxy version 7.0.0 through 7.0.8 FortiOS version 7.2.0 through 7.2.3 FortiOS version 7.0.0 through 7.0.9 FortiOS version 6.4.0 through 6.4.11 FortiOS version 6.2.3 and above  

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-22-364

CVSS Score:

5.2

FortiOS / FortiProxy – Heap buffer underflow in administrative interface

Advisory Summary:

Heap Buffer Underflow Vulnerability in FortiOS & FortiProxy

Affected Products:

FortiOS version 7.2.0 through 7.2.3 FortiOS version 7.0.0 through 7.0.9 FortiOS version 6.4.0 through 6.4.11 FortiOS version 6.2.0 through 6.2.12 FortiOS 6.0 all versions FortiProxy version 7.2.0 through 7.2.2 FortiProxy version 7.0.0 through 7.0.8 FortiProxy version 2.0.0 through 2.0.11 FortiProxy 1.2 all versions FortiProxy 1.1 all versions   Even when running a vulnerable FortiOS version, the hardware devices listed below are *only* impacted by the DoS part of the issue, *not* by the arbitrary code execution (non-listed devices are vulnerable to both):    FortiGateRugged-100C FortiGate-100D FortiGate-200C FortiGate-200D FortiGate-300C FortiGate-3600A FortiGate-5001FA2 FortiGate-5002FB2 FortiGate-60D FortiGate-620B FortiGate-621B FortiGate-60D-POE FortiWiFi-60D FortiWiFi-60D-POE FortiGate-300C-Gen2 FortiGate-300C-DC-Gen2 FortiGate-300C-LENC-Gen2 FortiWiFi-60D-3G4G-VZW FortiGate-60DH FortiWiFi-60DH FortiGateRugged-60D FortiGate-VM01-Hyper-V FortiGate-VM01-KVM FortiWiFi-60D-I FortiGate-60D-Gen2 FortiWiFi-60D-J FortiGate-60D-3G4G-VZW FortiWifi-60D-Gen2 FortiWifi-60D-Gen2-J FortiWiFi-60D-T FortiGateRugged-90D FortiWifi-60D-Gen2-U FortiGate-50E FortiWiFi-50E FortiGate-51E FortiWiFi-51E FortiWiFi-50E-2R FortiGate-52E FortiGate-40F FortiWiFi-40F FortiGate-40F-3G4G FortiWiFi-40F-3G4G FortiGate-40F-3G4G-NA FortiGate-40F-3G4G-EA FortiGate-40F-3G4G-JP FortiWiFi-40F-3G4G-NA FortiWiFi-40F-3G4G-EA FortiWiFi-40F-3G4G-JP FortiGate-40F-Gen2 FortiWiFi-40F-Gen2

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-23-001

CVSS Score:

9.3

FortiSOAR – Improper Authorization in request headers

Advisory Summary:

improper access control vulnerability in FortiSOAR’s playbook component.

Affected Products:

FortiSOAR version 7.3.0 through 7.3.1

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-23-050

CVSS Score:

7.5

FortiAnalyzer – CSV injection in macro name

Advisory Summary:

CSV injection in the ‘name’ field when creating new macros.

Affected Products:

FortiAnalyzer version 7.2.0 through 7.2.1 FortiAnalyzer version 7.0.0 through 7.0.5 FortiAnalyzer 6.4 all versions

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-22-488

CVSS Score:

4

FortiWeb – command injection in webserver

Advisory Summary:

Incorrect input sanitization in CGI component

Affected Products:

FortiWeb version 7.0.0 through 7.0.2FortiWeb version 6.3.6 through 6.3.20FortiWeb 6.4 all versions

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-22-254

CVSS Score:

7.2

FortiRecorder – DoS in login authentication mechanism

Advisory Summary:

Denial of Service can be reached via crafted GET requests. All the already logged users are logged out from the device which becomes unavailable due to resources consumption.

Affected Products:

FortiRecorder 6.4.3 and below, FortiRecorder 6.0.11 to 6.0.0

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-22-388

CVSS Score:

6.8

FortiAnalyzer — the log-fetch client request password is shown in clear text in the heartbeat response

Advisory Summary:

The log-fetch client request password is shown in clear text in the heartbeat response in FortiAnalyzer

Affected Products:

FortiAnalyzer version 7.2.0 through 7.2.1FortiAnalyzer version 7.0.0 through 7.0.4FortiAnalyzer version 6.4.0 through 6.4.10

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-22-447

CVSS Score:

4.6

FortiWeb and FortiRecorder – Arbitrary file read through command line pipe

Advisory Summary:

Arbitrary file read In FortiWeb/FortiRecorder

Affected Products:

FortiWeb version 6.4.0 through 6.4.1 FortiWeb version 6.3.0 through 6.3.17 FortiWeb all versions 6.2 FortiWeb all versions 6.1 FortiWeb all versions 6.0 FortiRecorder version 6.4.0 through 6.4.3 FortiRecorder all versions 6.0 FortiRecorder all versions 2.7

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-21-218

CVSS Score:

5.2

FortiOS – Path traversal in execute command

Advisory Summary:

Path traversal vulnerability in FortiOS

Affected Products:

FortiOS version 7.2.0 through 7.2.3 FortiOS version 7.0.0 through 7.0.9 FortiOS version 6.4.0 through 6.4.11 FortiOS 6.2 all versions FortiOS 6.0 all versions

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-22-369

CVSS Score:

6.5

FortiNAC – Multiple Reflected XSS

Advisory Summary:

Cross Site Scripting (XSS) on the WebUI

Affected Products:

FortiNAC version 9.4.0 FortiNAC version 9.2.0 through 9.2.5 FortiNAC version 9.1.0 through 9.1.8 FortiNAC all versions 8.8, 8.7, 8.6, 8.5, 8.3

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-22-281

CVSS Score:

7.1

FortiNAC – Multiple privilege escalation via sudo command

Advisory Summary:

Users with shell access can elevate their privileges to root.

Affected Products:

FortiNAC version 9.4.0 through 9.4.1 FortiNAC version 9.2.0 through 9.2.6 FortiNAC version 9.1.0 through 9.1.8 FortiNAC all versions 8.8, 8.7, 8.6, 8.5, 8.3

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-22-309

CVSS Score:

7.8

FortiManager, FortiAnalyzer, FortiPortal & FortiSwitch – Information disclosure through diagnose debug commands

Advisory Summary:

`diagnose debug` commands allowed for restricted administrators

Affected Products:

At least FortiManager version 6.0.0 through 6.0.4 At least FortiAnalyzer version 6.0.0 through 6.0.4 At least FortiPortal 4.1 all versions FortiPortal 4.2 all versions FortiPortal 5.0 all versions FortiPortal 5.1 all versions FortiPortal 5.2 all versions FortiPortal 5.3 all versions FortiPortal version 6.0.0 through 6.0.9 At least FortiSwitch version 6.0.0 through 6.0.7 FortiSwitch version 6.2.0 through 6.2.7 FortiSwitch version 6.4.0 through 6.4.10 FortiSwitch version 7.0.0 through 7.0.4

Fortinet Advisory:

https://www.fortiguard.com/psirt/FG-IR-18-232

CVSS Score:

5.1