/

CVE-2023-27997 Report - Details, Severity, & Advisories

CVE-2023-27997 Report - Details, Severity, & Advisories

Twingate Team

Apr 17, 2024

CVE-2023-27997 is a critical heap-based buffer overflow vulnerability affecting certain versions of FortiOS and FortiProxy SSL-VPN systems. With a severity rating of 9.8, this vulnerability could potentially allow a remote attacker to execute arbitrary code or commands through specifically crafted requests. Systems running the impacted versions of FortiOS and FortiProxy are at risk.

How do I know if I'm affected?

If you're wondering whether your system is affected by the vulnerability, you should check if you're using the following versions: FortiOS 7.2.4 and below, 7.0.11 and below, 6.4.12 and below, 6.0.16 and below; or FortiProxy 7.2.3 and below, 7.0.9 and below, 2.0.12 and below, and all versions of 1.2 and 1.1. This vulnerability is a critical issue that could allow a remote attacker to execute arbitrary code or commands through specifically crafted requests, so it's important to be aware if your system is at risk.

What should I do if I'm affected?

If you're affected by the vulnerability, it's crucial to take action. First, disable SSL-VPN on your system. Then, upgrade your FortiOS and FortiProxy versions to the recommended versions or higher. By following these steps, you can mitigate the risk and protect your system from potential attacks.

Is CVE-2023-27997 in CISA’s Known Exploited Vulnerabilities Catalog?

Yes, it is in CISA's Known Exploited Vulnerabilities Catalog. The CVE-2023-27997 vulnerability, also known as the Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability was added to the catalog on June 13, 2023, and the due date for applying the required action is July 4, 2023. To address this vulnerability, organizations must apply updates as per the vendor's instructions.

Weakness enumeration

The Weakness Enumeration section describes two types of vulnerabilities: CWE-787 (Out-of-bounds Write) and CWE-122 (Heap-based Buffer Overflow). These can allow remote attackers to execute arbitrary code or commands on affected systems.

For more details

CVE-2023-27997 is a critical vulnerability that requires immediate attention. For a comprehensive understanding of the vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD page or the links below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

CVE-2023-27997 Report - Details, Severity, & Advisories

CVE-2023-27997 Report - Details, Severity, & Advisories

Twingate Team

Apr 17, 2024

CVE-2023-27997 is a critical heap-based buffer overflow vulnerability affecting certain versions of FortiOS and FortiProxy SSL-VPN systems. With a severity rating of 9.8, this vulnerability could potentially allow a remote attacker to execute arbitrary code or commands through specifically crafted requests. Systems running the impacted versions of FortiOS and FortiProxy are at risk.

How do I know if I'm affected?

If you're wondering whether your system is affected by the vulnerability, you should check if you're using the following versions: FortiOS 7.2.4 and below, 7.0.11 and below, 6.4.12 and below, 6.0.16 and below; or FortiProxy 7.2.3 and below, 7.0.9 and below, 2.0.12 and below, and all versions of 1.2 and 1.1. This vulnerability is a critical issue that could allow a remote attacker to execute arbitrary code or commands through specifically crafted requests, so it's important to be aware if your system is at risk.

What should I do if I'm affected?

If you're affected by the vulnerability, it's crucial to take action. First, disable SSL-VPN on your system. Then, upgrade your FortiOS and FortiProxy versions to the recommended versions or higher. By following these steps, you can mitigate the risk and protect your system from potential attacks.

Is CVE-2023-27997 in CISA’s Known Exploited Vulnerabilities Catalog?

Yes, it is in CISA's Known Exploited Vulnerabilities Catalog. The CVE-2023-27997 vulnerability, also known as the Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability was added to the catalog on June 13, 2023, and the due date for applying the required action is July 4, 2023. To address this vulnerability, organizations must apply updates as per the vendor's instructions.

Weakness enumeration

The Weakness Enumeration section describes two types of vulnerabilities: CWE-787 (Out-of-bounds Write) and CWE-122 (Heap-based Buffer Overflow). These can allow remote attackers to execute arbitrary code or commands on affected systems.

For more details

CVE-2023-27997 is a critical vulnerability that requires immediate attention. For a comprehensive understanding of the vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD page or the links below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

CVE-2023-27997 Report - Details, Severity, & Advisories

Twingate Team

Apr 17, 2024

CVE-2023-27997 is a critical heap-based buffer overflow vulnerability affecting certain versions of FortiOS and FortiProxy SSL-VPN systems. With a severity rating of 9.8, this vulnerability could potentially allow a remote attacker to execute arbitrary code or commands through specifically crafted requests. Systems running the impacted versions of FortiOS and FortiProxy are at risk.

How do I know if I'm affected?

If you're wondering whether your system is affected by the vulnerability, you should check if you're using the following versions: FortiOS 7.2.4 and below, 7.0.11 and below, 6.4.12 and below, 6.0.16 and below; or FortiProxy 7.2.3 and below, 7.0.9 and below, 2.0.12 and below, and all versions of 1.2 and 1.1. This vulnerability is a critical issue that could allow a remote attacker to execute arbitrary code or commands through specifically crafted requests, so it's important to be aware if your system is at risk.

What should I do if I'm affected?

If you're affected by the vulnerability, it's crucial to take action. First, disable SSL-VPN on your system. Then, upgrade your FortiOS and FortiProxy versions to the recommended versions or higher. By following these steps, you can mitigate the risk and protect your system from potential attacks.

Is CVE-2023-27997 in CISA’s Known Exploited Vulnerabilities Catalog?

Yes, it is in CISA's Known Exploited Vulnerabilities Catalog. The CVE-2023-27997 vulnerability, also known as the Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability was added to the catalog on June 13, 2023, and the due date for applying the required action is July 4, 2023. To address this vulnerability, organizations must apply updates as per the vendor's instructions.

Weakness enumeration

The Weakness Enumeration section describes two types of vulnerabilities: CWE-787 (Out-of-bounds Write) and CWE-122 (Heap-based Buffer Overflow). These can allow remote attackers to execute arbitrary code or commands on affected systems.

For more details

CVE-2023-27997 is a critical vulnerability that requires immediate attention. For a comprehensive understanding of the vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD page or the links below.