CVE-2023-42789

Vulnerability updated 4 months ago (2024-11-29T14:28:44.054Z)
Download STIX
Preview STIX
CVE-2023-42789 is a critical out-of-bounds write vulnerability that affects multiple versions of both FortiOS and FortiProxy. This flaw in software design or implementation could potentially allow an inside attacker, who has access to the captive portal, to execute arbitrary code or commands via specially crafted HTTP requests. The vulnerability, along with another stack-based buffer overflow (CVE-2023-42790), was highlighted in the vendor's security advisory and received a high CVSS rating of 9.3, indicating its severe impact. The vulnerabilities were identified in the captive portal of FortiOS and FortiProxy. Both CVE-2023-42789 and CVE-2023-42790 have been addressed by the company as per the information provided on cybersecurity-help.cz. These vulnerabilities, if exploited, can cause significant damage, including unauthorized execution of code or commands, posing a serious threat to the integrity and confidentiality of the system. Moreover, reports indicate that the remote code execution vulnerabilities (CVE-2023-42789, CVE-2023-42790, CVE-2023-47534, and CVE-2023-48788) in FortiClientEMS, FortiOS, and FortiProxy are at a high risk of exploitation. This suggests an urgent need for users to update their systems to the latest versions to mitigate these threats. In conclusion, these vulnerabilities pose a significant risk, and immediate action is required to prevent potential cyber attacks.
Description last updated: 2024-03-22T00:06:15.496Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Vulnerability
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.