Lucene search

K
vulnrichmentFortinetVULNRICHMENT:CVE-2023-50178
HistoryJul 09, 2024 - 3:33 p.m.

CVE-2023-50178

2024-07-0915:33:32
CWE-295
fortinet
github.com
improper certificate validation
fortiadc
man-in-the-middle
sdn connectors
fortitoken cloud

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:F/RL:U/RC:C

AI Score

7.3

Confidence

Low

EPSS

0

Percentile

9.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

An improper certificate validation vulnerability [CWE-295] in FortiADC 7.4.0, 7.2.0 through 7.2.3, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and various remote servers such as private SDN connectors and FortiToken Cloud.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:fortinet:fortiadc:6.0.0:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortiadc",
    "versions": [
      {
        "status": "affected",
        "version": "6.0.0",
        "versionType": "custom",
        "lessThanOrEqual": "6.0.4"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:fortinet:fortiadc:6.1.0:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortiadc",
    "versions": [
      {
        "status": "affected",
        "version": "6.1.0",
        "versionType": "custom",
        "lessThanOrEqual": "6.1.6"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:fortinet:fortiadc:6.2.0:-:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortiadc",
    "versions": [
      {
        "status": "affected",
        "version": "6.2.0",
        "versionType": "custom",
        "lessThanOrEqual": "6.2.6"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:fortinet:fortiadc:-:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortiadc",
    "versions": [
      {
        "status": "affected",
        "version": "7.0.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.0.2"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:fortinet:fortiadc:-:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortiadc",
    "versions": [
      {
        "status": "affected",
        "version": "7.1.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:F/RL:U/RC:C

AI Score

7.3

Confidence

Low

EPSS

0

Percentile

9.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-50178