CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
High
EPSS
Percentile
37.5%
A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection.
Vendor | Product | Version | CPE |
---|---|---|---|
fortinet | fortiproxy | * | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* |
fortinet | fortiproxy | 7.2.0 | cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:* |
fortinet | fortiproxy | 7.2.1 | cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:* |
fortinet | fortiproxy | 7.2.2 | cpe:2.3:a:fortinet:fortiproxy:7.2.2:*:*:*:*:*:*:* |
fortinet | fortios | * | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
High
EPSS
Percentile
37.5%