SOCRadar® Cyber Intelligence Inc. | Critical RCE Vulnerability (CVE-2023-33308) in FortiOS and FortiProxy: Immediate Security Update Required
Home

Resources

Blog
Jul 12, 2023
3 Mins Read

Critical RCE Vulnerability (CVE-2023-33308) in FortiOS and FortiProxy: Immediate Security Update Required

Fortinet has recently addressed a critical Remote Code Execution (RCE) vulnerability that affects FortiOS and FortiProxy. This vulnerability, tracked as CVE-2023-33308 and rated with a CVSSv3 score of 9.8, could be exploited by remote attackers to execute unauthorized code or commands on vulnerable systems. It is crucial for users and administrators to promptly apply the necessary security updates to protect their environments.

About CVE-2023-33308: A Stack-Based Buffer Overflow Vulnerability

The vulnerability arises from a stack-based buffer overflow in FortiOS and FortiProxy. It can be exploited through crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL/TLS deep packet inspection. The severity of this vulnerability has been rated as critical.

Affected Versions

The following versions of FortiOS and FortiProxy are impacted by the CVE-2023-33308 vulnerability: 

FortiOS:

  • Versions 7.2.0 to 7.2.3
  • Versions 7.0.0 to 7.0.10

FortiProxy:

  • Versions 7.2.0 to 7.2.2
  • Versions 7.0.0 to 7.0.9

According to the Fortinet advisory, it has been clarified that the CVE-2023-33308 vulnerability does not affect FortiOS versions 6.0, 6.2, 6.4, and FortiProxy versions 2.x, and 1.x.

Security Updates and Fixes for the CVE-2023-33308

Fortinet has provided security updates and fixes for the CVE-2023-33308 vulnerability. Users are advised to upgrade to the following versions:

FortiOS:

  • Version 7.4.0 or above
  • Version 7.2.4 or above
  • Version 7.0.11 or above

FortiProxy:

  • Version 7.2.3 or above
  • Version 7.0.10 or above

CISA has also issued an alert regarding the vulnerability, advising affected organizations to promptly apply the available security update.

Workaround for the CVE-2023-33308

As a temporary workaround, users can disable HTTP/2 support on SSL/TLS inspection profiles used by proxy policies or firewall policies with proxy mode. Detailed instructions can be found in the Fortinet security release FG-IR-23-183.

The CVE-2023-33308 vulnerability poses a significant threat to systems running FortiOS and FortiProxy. It is crucial for users and administrators to promptly update their software to the recommended versions or apply the provided security fixes. By doing so, organizations can mitigate the risk of unauthorized code execution and ensure the security of their networks.

Enhancing Vulnerability Management with SOCRadar’s Vulnerability Intelligence Module 

SOCRadar’s Vulnerability Intelligence Module is an invaluable tool for addressing the risks associated with vulnerabilities like CVE-2023-33308. This comprehensive solution ensures that your organization can effectively address vulnerabilities and minimize potential risks.

Vulnerability Intelligence module on SOCRadar platform
Vulnerability Intelligence module on SOCRadar platform

With SOCRadar’s Attack Surface Management, you gain the ability to continuously monitor vulnerabilities in the products detected within your organization’s digital footprint in real-time. 

This empowers you to stay informed about the vulnerabilities that are targeted by threat actors, enabling you to gain actionable insights and contextual information for faster assessment and verification processes. 

Company Vulnerabilities page on SOCRadar platform
Company Vulnerabilities page on SOCRadar platform