THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2023-50178

Assignerfortinet
Reserved2023-12-05
Published2024-07-09
Updated2024-07-12

Description

An improper certificate validation vulnerability [CWE-295] in FortiADC 7.4.0, 7.2.0 through 7.2.3, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and various remote servers such as private SDN connectors and FortiToken Cloud.



HIGH: 7.2CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:F/RL:U/RC:C

Problem types

Information disclosure

Product status

Default status
unaffected

7.1.0
affected

7.0.0
affected

6.2.0
affected

6.1.0
affected

6.0.0
affected

References

https://fortiguard.fortinet.com/psirt/FG-IR-22-298

cve.org CVE-2023-50178

nvd.nist.gov CVE-2023-50178

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-50178
© Copyright 2024 THREATINT. Made in Cyprus with +