{"id":28993,"date":"2023-03-08T16:44:20","date_gmt":"2023-03-08T15:44:20","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=28993"},"modified":"2023-07-19T16:23:21","modified_gmt":"2023-07-19T14:23:21","slug":"fortinet-march-2023-security-advisory","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2023\/03\/08\/fortinet-march-2023-security-advisory\/","title":{"rendered":"Fortinet March 2023 Security Advisory"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2023\/03\/08\/maerz-2023-sicherheitshinweise-von-fortinet-u-a-dos-schwachstelle-cve-2022-45861-in-fortios-und-fortiproxy\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Administrators of Fortinet's FortiOS and FortiProxy must become active. The manufacturer has published various security advisories for different products as of March 7, 2023. Among other things, a DoS vulnerability CVE-2022-45861 in FortiOS and FortiProxy are addressed. Some of the vulnerabilities are very critical (CVSSv3 score 9.3).<\/p>\n<p><!--more--><\/p>\n<h2>Fortinet March 2023 Vulnerability Advisories<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg05.met.vgwort.de\/na\/dd9e9aa65914442cacc132214fac49ec\" alt=\"\" width=\"1\" height=\"1\" \/>The issue has been reported to me by an anonymous German blog reader in the discussion area with the following text (thanks for that).<\/p>\n<blockquote><p>Vulnerabilities in FortiOS (FortiGate Firewalls) and other products &#8211; some of them very critical<\/p><\/blockquote>\n<p>Fortinet has addressed various security advisories in theMarch 2023 Vulnerability Advisories. Below I have pulled out three vulnerability descriptions with higher risk &#8211; the list of all vulnerabilities can be found in the March 2023 Vulnerability Advisory.<\/p>\n<h3>FortiOS \/ FortiProxy &#8211; Heap buffer underflow in administrative interface<\/h3>\n<p>A 'buffer underflow' vulnerability <a class=\"link\" href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-25610\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2023-25610<\/a> exists in the FortiOS &amp; FortiProxy administrative interface, allowing an unauthenticated remote attacker to execute arbitrary code on the device and\/or perform a DoS on the graphical user interface (GUI) via specially crafted requests. The vulnerability is critical, CVSSv3 score 9.3. Affected are:<\/p>\n<p>FortiOS version 7.2.0 through 7.2.3<br \/>\nFortiOS version 7.0.0 through 7.0.9<br \/>\nFortiOS version 6.4.0 through 6.4.11<br \/>\nFortiOS version 6.2.0 through 6.2.12<br \/>\nFortiOS 6.0 all versions<br \/>\nFortiProxy version 7.2.0 through 7.2.2<br \/>\nFortiProxy version 7.0.0 through 7.0.8<br \/>\nFortiProxy version 2.0.0 through 2.0.11<br \/>\nFortiProxy 1.2 all versions<br \/>\nFortiProxy 1.1 all versions<\/p>\n<p>Details may be read at <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-23-001\" target=\"_blank\" rel=\"noopener\">FortiOS \/ FortiProxy &#8211; Heap buffer underflow in administrative interface<\/a> (dates March 7, 203).<\/p>\n<h3>FortiOS \/ FortiProxy &#8211; Path traversal vulnerability allows VDOM escaping<\/h3>\n<p>A relative path traversal vulnerability [CWE-23] in FortiOS and FortiProxy may allow privileged VDOM administrators to elevate their privileges via manipulated CLI requests to the system's super admin. Affected are:<\/p>\n<p>FortiOS version 7.2.0 through 7.2.3<br \/>\nFortiOS version 7.0.0 through 7.0.8<br \/>\nFortiOS version 6.4.0 through 6.4.11<br \/>\nFortiOS version 6.2.0 through 6.2.12<\/p>\n<p>FortiProxy version 7.2.0 through 7.2.1<br \/>\nFortiProxy version 7.0.0 through 7.0.7<br \/>\nFortiProxy version 2.0.0 through 2.0.11<br \/>\nFortiProxy version 1.2.0 through 1.2.13<br \/>\nFortiProxy version 1.1.0 through 1.1.6<\/p>\n<p>Note: Impact on FortiProxy 7.0.x, 2.0.x, 1.2.x, 1.1.x is minor as it does not have VDOMs<\/p>\n<p>Vulnerability <a class=\"link\" href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-42476\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2022-42476<\/a> has a CVSSv3 score of 7.8 (hight), details may be rad at <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-22-401\" target=\"_blank\" rel=\"noopener\">FG-IR-22-401<\/a>.<\/p>\n<h3>FortiOS &amp; FortiProxy &#8211; Access of NULL pointer in SSLVPNd<\/h3>\n<p>Security advisory <em>FortiOS &amp; FortiProxy &#8211; Access of NULL pointer in SSLVPNd<\/em> (FG-IR-22-477) has details about a DoS vulnerability CVE-2022-45861 in FortiOS and FortiProxy. CVSSv3 has a score of 6.4 and it was sayed:<\/p>\n<blockquote><p>An uninitialized pointer vulnerability [CWE-824] in the FortiOS &amp; FortiProxy SSL VPN portal may allow a remote authenticated attacker to crash the sslvpn daemon via an HTTP GET request.<\/p><\/blockquote>\n<p>Affected are:<\/p>\n<p>FortiOS version 7.2.0 through 7.2.3<br \/>\nFortiOS version 7.0.0 through 7.0.9<br \/>\nFortiOS version 6.4.0 through 6.4.11<br \/>\nFortiOS 6.2 all versions<\/p>\n<p>FortiProxy version 7.2.0 through 7.2.1<br \/>\nFortiProxy version 7.0.0 through 7.0.7<br \/>\nFortiProxy version 2.0.0 through 2.0.11<br \/>\nFortiProxy 1.2 all versions<br \/>\nFortiProxy 1.1 all versions<\/p>\n<p>Advisary FG-IR-22-477 has more details. Upgrades are available.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Administrators of Fortinet's FortiOS and FortiProxy must become active. The manufacturer has published various security advisories for different products as of March 7, 2023. Among other things, a DoS vulnerability CVE-2022-45861 in FortiOS and FortiProxy are addressed. Some of the &hellip; <a href=\"https:\/\/borncity.com\/win\/2023\/03\/08\/fortinet-march-2023-security-advisory\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69,1544],"class_list":["post-28993","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=28993"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28993\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=28993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=28993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=28993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}