SSL-VPN user IP spoofing
Summary
An insufficient verification of data authenticity vulnerability [CWE-345] in FortiOS & FortiProxy SSL-VPN tunnel mode may allow an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.
Version | Affected | Solution |
---|---|---|
FortiOS 7.4 | 7.4.0 through 7.4.1 | Upgrade to 7.4.2 or above |
FortiOS 7.2 | 7.2.0 through 7.2.7 | Upgrade to 7.2.8 or above |
FortiOS 7.0 | 7.0.0 through 7.0.12 | Upgrade to 7.0.13 or above |
FortiOS 6.4 | 6.4 all versions | Migrate to a fixed release |
FortiOS 6.2 | 6.2 all versions | Migrate to a fixed release |
FortiProxy 7.4 | 7.4.0 through 7.4.1 | Upgrade to 7.4.2 or above |
FortiProxy 7.2 | 7.2.0 through 7.2.7 | Upgrade to 7.2.8 or above |
FortiProxy 7.0 | 7.0.0 through 7.0.13 | Upgrade to 7.0.14 or above |
FortiProxy 2.0 | 2.0 all versions | Migrate to a fixed release |
FortiSASE: Issue remediated Q4/23
Acknowledgement
Fortinet is pleased to thank Ta-Lun Yen from TXone Networks for reporting this vulnerability under responsible disclosure.Timeline
2024-05-14: Initial publication