Fortinet has identified a vulnerability, CVE-2023-27997, in its FortiGate firewalls that could be leveraged maliciously to gain remote code execution capability.
This issue has been found on every SSL VPN appliance, but the details of the security flaw are shrouded in mystery until Fortinet publishes an official advisory. Fortunately, the vulnerability has been addressed in several versions of the platform, including 6.2.15, 6.4.13, 7.0.12, and 7.2.5.
What FortiOS Versions Are Affected by CVE-2023-27997?
According to the official description, CVE-2023-27997 is a heap-based buffer overflow vulnerability in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1, all versions SSL-VPN.
The vulnerability may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests, as per MITRE’s description.
As attacks on Fortinet products are becoming increasingly commonplace, customers and users of these firewalls should apply the fixes as soon as possible to guard against potential threats.