CVE-2023-33308
FortiOS vulnerability analysis and mitigation

Overview

A critical stack-based overflow vulnerability (CVE-2023-33308) was discovered in Fortinet FortiOS and FortiProxy. The vulnerability affects FortiOS versions 7.0.0 through 7.0.10 and 7.2.0 through 7.2.3, as well as FortiProxy versions 7.0.0 through 7.0.9 and 7.2.0 through 7.2.2. This vulnerability was initially disclosed on July 11, 2023, and received a CVSS v3.1 score of 9.8, indicating critical severity (Fortinet Advisory, NVD).

Technical details

The vulnerability is a stack-based buffer overflow (CWE-121) that occurs in proxy policies or firewall policies with proxy mode when SSL deep packet inspection is enabled. The flaw specifically relates to HTTP/2 support in SSL inspection profiles. A remote unauthenticated attacker could potentially exploit this vulnerability by sending specially crafted packets to systems with proxy policies or firewall policies configured in proxy mode alongside deep or full packet inspection (Fortinet Advisory).

Impact

If successfully exploited, this vulnerability allows an unauthenticated remote attacker to execute arbitrary code or commands on the affected system. Given the critical nature of FortiOS and FortiProxy in network security infrastructure, successful exploitation could lead to complete system compromise and potential access to the protected network (Arctic Wolf, Fortinet Advisory).

Mitigation and workarounds

Fortinet has released patches to address this vulnerability. Organizations are advised to upgrade to FortiOS version 7.4.0 or above, 7.2.4 or above, or 7.0.11 or above, and FortiProxy version 7.4.0, 7.2.3, or 7.0.10 or above. As a temporary workaround, organizations can disable HTTP/2 support on SSL inspection profiles used by proxy policies or firewall policies with proxy mode (Fortinet Advisory).

Community reactions

The issue was initially resolved as a bug without a corresponding PSIRT Advisory. Fortinet acknowledged Watchtowr for bringing this omission to their attention, leading to the formal security advisory (Fortinet Advisory).

Additional resources


SourceThis report was generated using AI

Related FortiOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59718CRITICAL9.8
  • FortiOSFortiOS
  • cpe:2.3:a:fortinet:fortiproxy
NoYesDec 09, 2025
CVE-2025-58413HIGH7.5
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoYesNov 18, 2025
CVE-2024-47570MEDIUM6.6
  • FortiOSFortiOS
  • cpe:2.3:a:fortinet:fortiproxy
NoYesDec 09, 2025
CVE-2025-62631MEDIUM5.6
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoYesDec 09, 2025
CVE-2024-40593MEDIUM4.4
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoYesDec 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management