cvelist/2023/27xxx/CVE-2023-27997.json

199 lines
9.6 KiB
JSON
Raw Normal View History

2023-03-09 11:00:37 +00:00
{
2023-06-13 09:00:43 +00:00
"data_version": "4.0",
2023-03-09 11:00:37 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-27997",
2023-06-13 09:00:43 +00:00
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
2023-03-09 11:00:37 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-06-13 09:00:43 +00:00
"value": "A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Execute unauthorized code or commands",
"cweId": "CWE-122"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Fortinet",
"product": {
"product_data": [
{
"product_name": "FortiOS-6K7K",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "7.0.10"
},
{
"version_affected": "=",
"version_value": "7.0.5"
},
{
"version_affected": "=",
"version_value": "6.4.12"
},
{
"version_affected": "=",
"version_value": "6.4.10"
},
{
"version_affected": "=",
"version_value": "6.4.8"
},
{
"version_affected": "=",
"version_value": "6.4.6"
},
{
"version_affected": "=",
"version_value": "6.4.2"
},
{
"version_affected": "<=",
"version_name": "6.2.9",
"version_value": "6.2.13"
},
{
"version_affected": "<=",
"version_name": "6.2.6",
"version_value": "6.2.7"
},
{
"version_affected": "=",
"version_value": "6.2.4"
},
{
"version_affected": "<=",
"version_name": "6.0.12",
"version_value": "6.0.16"
},
{
"version_affected": "=",
"version_value": "6.0.10"
}
]
}
},
{
"product_name": "FortiProxy",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "7.2.0",
"version_value": "7.2.3"
},
{
"version_affected": "<=",
"version_name": "7.0.0",
"version_value": "7.0.9"
},
{
"version_affected": "<=",
"version_name": "2.0.0",
"version_value": "2.0.12"
},
{
"version_affected": "<=",
"version_name": "1.2.0",
"version_value": "1.2.13"
},
{
"version_affected": "<=",
"version_name": "1.1.0",
"version_value": "1.1.6"
}
]
}
},
{
"product_name": "FortiOS",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "7.2.0",
"version_value": "7.2.4"
},
{
"version_affected": "<=",
"version_name": "7.0.0",
"version_value": "7.0.11"
},
{
"version_affected": "<=",
"version_name": "6.4.0",
"version_value": "6.4.12"
},
{
"version_affected": "<=",
"version_name": "6.2.0",
"version_value": "6.2.13"
},
{
"version_affected": "<=",
"version_name": "6.0.0",
"version_value": "6.0.16"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-097",
"refsource": "MISC",
"name": "https://fortiguard.com/psirt/FG-IR-23-097"
}
]
},
"solution": [
{
"lang": "en",
"value": "Please upgrade to FortiOS-6K7K version 7.0.12 or above\r\nPlease upgrade to FortiOS-6K7K version 6.4.13 or above\r\nPlease upgrade to FortiOS-6K7K version 6.2.15 or above\r\nPlease upgrade to FortiOS-6K7K version 6.0.17 or above\r\nPlease upgrade to FortiProxy version 7.2.4 or above\r\nPlease upgrade to FortiProxy version 7.0.10 or above\r\nPlease upgrade to FortiOS version 7.4.0 or above\r\nPlease upgrade to FortiOS version 7.2.5 or above\r\nPlease upgrade to FortiOS version 7.0.12 or above\r\nPlease upgrade to FortiOS version 6.4.13 or above\r\nPlease upgrade to FortiOS version 6.2.14 or above\r\nPlease upgrade to FortiOS version 6.0.17 or above"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.2,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:R"
2023-03-09 11:00:37 +00:00
}
]
}
}