Skip to main content

FortiOS and FortiProxy Impacted By Stack-Based Buffer Overflow

FortiOS and FortiProxy are impacted by stack-based buffer overflow vulnerability that may allow a remote attacker to execute arbitrary code or commands 

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

FortiOS and FortiProxy are impacted by stack-based buffer overflow vulnerability that may allow a remote attacker to execute arbitrary code or commands 


Threat details

Introduction

Fortinet have released a critical stack-based buffer overflow vulnerability impacting FortiOS and FortiProxy. This vulnerability may allow a remote attacker to execute arbitrary code or commands using specially crafted packets. This vulnerability impacts proxy mode with SSL deep packet inspection and is being tracked as CVE-2023-33308.


Remediation advice

Affected organisations are encouraged to review Fortinet's Security Advisory FG-IR-23-183 and apply the relevant updates.


Definitive source of threat updates


Last edited: 12 July 2023 2:43 pm