A interpretation conflict in Fortinet IPS Engine versions 7.321, 7.166 and 6.158 allows attacker to evade IPS features via crafted TCP packets.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-090 | Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-23-090 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 08:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-23-090 - Vendor Advisory |
13 Oct 2023, 18:38
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-436 | |
References | (MISC) https://fortiguard.com/psirt/FG-IR-23-090 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:fortinet:fortios_ips_engine:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
|
First Time |
Fortinet fortios
Fortinet fortios Ips Engine Fortinet |
10 Oct 2023, 17:52
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-10 17:15
Updated : 2024-11-21 08:20
NVD link : CVE-2023-40718
Mitre link : CVE-2023-40718
CVE.ORG link : CVE-2023-40718
JSON object : View
Products Affected
fortinet
- fortios_ips_engine
- fortios
CWE
CWE-436
Interpretation Conflict