1. Summary

Vulnerability Name

FortiOS/FortiProxy Stack-Based Buffer Overflow Vulnerability (CVE-2023-33308)

Release Date

July 13, 2023

Component Name

FortiOS and FortiProxy

Affected Versions

7.2.0 ≤ FortiOS ≤ 7.2.3
7.0.0 ≤ FortiOS ≤7.0.10
7.2.0 ≤ FortiProxy ≤7.2.2
7.0.0 ≤ FortiProxy ≤7.0.9

Vulnerability Type

CWE-124: Buffer Underwrite (Buffer Overflow)

Severity

CVSS v3 Base Score: 9.8 (Critical)

Exploitability

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

User Interaction: None

Impact

Confidentiality Impact: Awaiting analysis

Integrity Impact: Awaiting analysis

Availability Impact: Awaiting analysis

2. About the Vulnerability CVE-2023-33308

2.1 About the Component

FortiGate: FortiGate is a next-generation firewall by Fortinet, providing features such as firewall, VPN, intrusion prevention, antivirus, web filtering, and application control.

FortiProxy: FortiProxy is a web proxy appliance by Fortinet, providing features like web content filtering, SSL inspection, application control, and WAN optimization.

2.2 About the Vulnerability

On July 13, 2023, Sangfor FarSight Labs received notification about a FortiOS/FortiProxy stack-based buffer overflow vulnerability, identified as CVE-2023-33308, with a severity rating of Critical (CVSS Score 9.8).

This vulnerability arises when the proxy mode is enabled with SSL deep packet inspection, allowing a remote attacker to execute arbitrary code or commands by crafting packets that can reach the proxy policies or firewall policies.

3. Affected Versions

7.2.0 ≤ FortiOS ≤ 7.2.3
7.0.0 ≤ FortiOS ≤7.0.10
7.2.0 ≤ FortiProxy ≤7.2.2
7.0.0 ≤ FortiProxy ≤7.0.9

4. Solutions

4.1 Fortinet Solution

4.1.1 Version Upgrade

Fortinet has released updated versions of FortiGate and FortiProxy to fix the vulnerability, and users are recommended to upgrade as quickly as possible. 

FortiGate: https://docs.fortinet.com/product/fortigate/7.4

FortiProxy: https://docs.fortinet.com/product/fortiproxy/7.2

4.1.2 Workaround

For users who are unable to upgrade to the latest versions, Fortinet recommends disabling HTTP/2 support on SSL inspection profiles used by proxy policies or firewall policies with proxy mode.

Example with custom-deep-inspection profile:
config firewall ssl-ssh-profile
   edit "custom-deep-inspection"
      set supported-alpn http1-1
   next
end

5. Timeline

On July 13, 2023, Sangfor FarSight Labs received notification about the FortiOS/FortiProxy Stack-Based Buffer Overflow Vulnerability (CVE-2023-33308).

On July 13, 2023, Sangfor FarSight Labs released a vulnerability alert.

6. Reference

https://www.fortiguard.com/psirt/FG-IR-23-183

7. Learn More

Sangfor FarSight Labs researches the latest cyberthreats and unknown zero-day vulnerabilities, alerting customers to potential dangers to their organizations, and providing real-time solutions with actionable intelligence. Sangfor FarSight Labs works with other security vendors and the security community at large to identify and verify global cyberthreats, providing fast and easy protection for customers.

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Name
Email Address
Business Phone Number
Tell us about your project requirements

Related Articles

CVE-2024-47575: Fortinet FortiManager Authentication Vulnerability

Date : 25 Oct 2024
Read Now

CVE-2024-38819: Path Traversal Vulnerability

Date : 19 Oct 2024
Read Now

CVE-2024-40766: SonicWALL SonicOS Access Control Flaw Vulnerability

Date : 12 Sep 2024
Read Now

See Other Product

Platform-X
Sangfor Access Secure
Sangfor SSL VPN
Best Darktrace Cyber Security Competitors and Alternatives in 2024
Sangfor Omni-Command
Replace your Enterprise NGAV with Sangfor Endpoint Secure