
Cloud Vulnerability DB
A community-led vulnerabilities database
An improper verification of source of a communication channel vulnerability [CWE-940] in FortiOS was discovered and disclosed on September 6, 2022. The vulnerability affects multiple versions of FortiOS including versions 7.2.0, 7.0.0 through 7.0.5, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, and 6.0 all versions. This medium severity vulnerability (CVSS v3.1 score: 6.6) allows a remote and unauthenticated attacker to trigger the sending of 'blocked page' HTML data to an arbitrary victim via crafted TCP requests, potentially causing a denial of service condition (Fortinet Advisory, NVD).
The vulnerability is exploitable when a FortiOS firewall policy has inspection mode set to flow-based (default configuration) AND at least one Security Profile is enabled (Web Filter, AntiVirus, IPS, DLP, Application Control, SSL, or File filter). The attack leverages TCP middlebox reflection to trigger the sending of blocked page HTML data to arbitrary victims. The CVSS v3.1 base score is 6.6 (Medium) according to Fortinet's assessment, while NVD rates it at 7.5 (High) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (Fortinet Advisory, NVD).
The successful exploitation of this vulnerability can result in a denial of service condition where the attacker can flood arbitrary victims with blocked page HTML data. This attack can potentially disrupt service availability for targeted systems by overwhelming them with reflected traffic (Fortinet Advisory).
Fortinet has provided multiple mitigation options: 1) Upgrade to FortiOS version 6.2.11 or above, 6.4.9 or above, 7.0.6 or above, or 7.2.1 or above; 2) Alternatively, upgrade the IPS engine to specific versions (4.086 or above for 6.0.x, 5.259 or above for 6.2.x, 6.122 or above for 6.4.x, 7.114 or above for 7.0.x, and 7.215 or above for 7.2.0); 3) As workarounds, administrators can disable or adjust security profiles that trigger blocked page HTTP data, use proxy-based inspection mode instead of flow-based mode, or empty the replacement page in Security Profiles to limit amplification (Fortinet Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."