CVE-2023-42789 is a critical out-of-bounds write vulnerability that affects multiple versions of both FortiOS and FortiProxy. This flaw in software design or implementation could potentially allow an inside attacker, who has access to the captive portal, to execute arbitrary code or commands via specially crafted HTTP requests. The vulnerability, along with another stack-based buffer overflow (CVE-2023-42790), was highlighted in the vendor's security advisory and received a high CVSS rating of 9.3, indicating its severe impact.
The vulnerabilities were identified in the captive portal of FortiOS and FortiProxy. Both CVE-2023-42789 and CVE-2023-42790 have been addressed by the company as per the information provided on cybersecurity-help.cz. These vulnerabilities, if exploited, can cause significant damage, including unauthorized execution of code or commands, posing a serious threat to the integrity and confidentiality of the system.
Moreover, reports indicate that the remote code execution vulnerabilities (CVE-2023-42789, CVE-2023-42790, CVE-2023-47534, and CVE-2023-48788) in FortiClientEMS, FortiOS, and FortiProxy are at a high risk of exploitation. This suggests an urgent need for users to update their systems to the latest versions to mitigate these threats. In conclusion, these vulnerabilities pose a significant risk, and immediate action is required to prevent potential cyber attacks.
Description last updated: 2024-03-22T00:06:15.496Z