Fortinet Fortiproxy vulnerabilities

122 known vulnerabilities affecting fortinet/fortiproxy.

Total CVEs
122
CISA KEV
12
actively exploited
Public exploits
7
Exploited in wild
8
Severity breakdown
CRITICAL17HIGH39MEDIUM63LOW3

Vulnerabilities

Page 3 of 7
CVE-2024-55591CRITICALCVSS 9.8KEVPoC≥ 7.0.0, < 7.0.20≥ 7.2.0, < 7.2.13+2 more2025-01-14
CVE-2024-55591 [CRITICAL] CWE-288 CVE-2024-55591: An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiO An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
cvelistv5nvd
CVE-2024-46670HIGHCVSS 7.5≥ 7.4.0, ≤ 7.4.5≥ 7.2.0, ≤ 7.2.11+2 more2025-01-14
CVE-2024-46670 [HIGH] CWE-125 CVE-2024-46670: An Out-of-bounds Read vulnerability [CWE-125] in FortiOS version 7.6.0, version 7.4.4 and below, ver An Out-of-bounds Read vulnerability [CWE-125] in FortiOS version 7.6.0, version 7.4.4 and below, version 7.2.9 and below and FortiSASE FortiOS tenant version 24.3.b IPsec IKE service may allow an unauthenticated remote attacker to trigger memory consumption leading to Denial of Service via crafted requests.
cvelistv5nvd
CVE-2023-46715MEDIUMCVSS 4.3≥ 7.4.0, ≤ 7.4.1≥ 7.2.0, ≤ 7.2.6+1 more2025-01-14
CVE-2023-46715 [MEDIUM] CWE-346 CVE-2023-46715: An origin validation error [CWE-346] vulnerability in Fortinet FortiOS IPSec VPN version 7.4.0 thro An origin validation error [CWE-346] vulnerability in Fortinet FortiOS IPSec VPN version 7.4.0 through 7.4.1 and version 7.2.6 and below allows an authenticated IPSec VPN user with dynamic IP addressing to send (but not receive) packets spoofing the IP of another user via crafted network packets.
cvelistv5nvd
CVE-2024-54021MEDIUMCVSS 5.8≥ 7.2.0, < 7.2.12≥ 7.4.0, < 7.4.6+2 more2025-01-14
CVE-2024-54021 [MEDIUM] CWE-113 CVE-2024-54021: An Improper Neutralization of CRLF Sequences in HTTP Headers ('http response splitting') vulnerabili An Improper Neutralization of CRLF Sequences in HTTP Headers ('http response splitting') vulnerability [CWE-113] in Fortinet FortiOS 7.2.0 through 7.6.0, FortiProxy 7.2.0 through 7.4.5 may allow a remote unauthenticated attacker to bypass the file filter via crafted HTTP headers.
cvelistv5nvd
CVE-2024-52963MEDIUMCVSS 5.9≥ 7.4.0, ≤ 7.4.5≥ 7.2.0, ≤ 7.2.13+2 more2025-01-14
CVE-2024-52963 [MEDIUM] CWE-787 CVE-2024-52963: A out-of-bounds write in Fortinet FortiOS versions 7.6.0, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, A out-of-bounds write in Fortinet FortiOS versions 7.6.0, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4.0 through 6.4.15 allows attacker to trigger a denial of service via specially crafted packets.
cvelistv5nvd
CVE-2024-26011CRITICALCVSS 9.8≥ 1.0.0, < 7.0.17≥ 7.2.0, < 7.2.10+8 more2024-11-12
CVE-2024-26011 [CRITICAL] CWE-306 CVE-2024-26011: A missing authentication for critical function in Fortinet FortiManager version 7.4.0 through 7.4.2, A missing authentication for critical function in Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14, FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, 1.2.0 throug
cvelistv5nvd
CVE-2024-33510MEDIUMCVSS 4.3≥ 7.0.0, < 7.0.17≥ 7.2.0, < 7.2.10+4 more2024-11-12
CVE-2024-33510 [MEDIUM] CWE-358 CVE-2024-33510: An improper neutralization of special elements in output used by a downstream component ('Injection' An improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability [CWE-74] in FortiOS version 7.4.3 and below, version 7.2.8 and below, version 7.0.16 and below; FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below; FortiSASE version 24.2.b SSL-VPN web user interface
cvelistv5nvd
CVE-2022-45862HIGHCVSS 8.8≥ 7.0.0, < 7.4.0≥ 7.2.0, ≤ 7.2.11+1 more2024-08-13
CVE-2022-45862 [HIGH] CWE-613 CVE-2022-45862: An insufficient session expiration vulnerability [CWE-613] vulnerability in FortiOS 7.2.5 and below, An insufficient session expiration vulnerability [CWE-613] vulnerability in FortiOS 7.2.5 and below, 7.0 all versions, 6.4 all versions; FortiProxy 7.2 all versions, 7.0 all versions; FortiPAM 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions; FortiSwitchManager 7.2.1 and below, 7.0 all versions GUI may allow attackers to re-use w
cvelistv5nvd
CVE-2024-26015MEDIUMCVSS 4.7≥ 7.0.0, ≤ 7.4.3≥ 7.4.0, ≤ 7.4.3+1 more2024-07-09
CVE-2024-26015 [MEDIUM] CWE-1389 CVE-2024-26015: An incorrect parsing of numbers with different radices vulnerability [CWE-1389] in FortiProxy versio An incorrect parsing of numbers with different radices vulnerability [CWE-1389] in FortiProxy version 7.4.3 and below, version 7.2.10 and below, version 7.0.17 and below and FortiOS version 7.4.3 and below, version 7.2.8 and below, version 7.0.15 and below IP address validation feature may permit an unauthenticated attacker to bypass the IP blockli
cvelistv5nvd
CVE-2024-26010HIGHCVSS 7.5≥ 1.0.0, < 7.0.17≥ 7.2.0, < 7.2.10+8 more2024-06-11
CVE-2024-26010 [HIGH] CWE-121 CVE-2024-26010: A stack-based buffer overflow in Fortinet FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through A stack-based buffer overflow in Fortinet FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiWeb, FortiAuthenticator, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.1 through 7.0.3, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18,
cvelistv5nvd
CVE-2024-23111MEDIUMCVSS 4.8≥ 7.0.0, < 7.0.15≥ 7.2.0, < 7.2.9+4 more2024-06-11
CVE-2024-23111 [MEDIUM] CWE-79 CVE-2024-23111: An improper neutralization of input during web page Generation ('Cross-site Scripting') vulnerabilit An improper neutralization of input during web page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions reboot page may allow a remote privileged attacker with super-admin access to execute JavaScrip
cvelistv5nvd
CVE-2024-21754MEDIUMCVSS 4.4≥ 2.0.0, ≤ 2.0.14≥ 7.0.0, ≤ 7.0.18+3 more2024-06-11
CVE-2024-21754 [MEDIUM] CWE-916 CVE-2024-21754: A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting Fort A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions may allow a privileged attacker with super-admin profile and CLI access to d
cvelistv5nvd
CVE-2023-45583HIGHCVSS 7.2fixed in 7.0.12fixed in 7.2.6+2 more2024-05-14
CVE-2023-45583 [HIGH] CWE-134 CVE-2023-45583: A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7. A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.0.0 through 7.0.11, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 FortiPAM versions 1.1.0, 1.0.0 through 1.0.3 FortiOS versions 7.4.0, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15 FortiSwitchMan
cvelistv5nvd
CVE-2023-45586MEDIUMCVSS 5.0≥ 2.0.0, ≤ 2.0.12≥ 7.0.0, < 7.0.14+6 more2024-05-14
CVE-2023-45586 [MEDIUM] CWE-345 CVE-2023-45586: An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VP An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not rece
cvelistv5nvd
CVE-2023-36640MEDIUMCVSS 6.7≥ 1.0.0, ≤ 1.0.7≥ 1.1.0, ≤ 1.1.6+4 more2024-05-14
CVE-2023-36640 [MEDIUM] CWE-134 CVE-2023-36640: A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7. A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM versions 1.0.0 through 1.0.3, FortiOS versions 7.2.0, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.
cvelistv5nvd
CVE-2023-41677HIGHCVSS 8.8≥ 1.0.0, < 7.0.14≥ 7.2.0, < 7.2.8+8 more2024-04-09
CVE-2023-41677 [HIGH] CWE-522 CVE-2023-41677: A insufficiently protected credentials in Fortinet FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 thro A insufficiently protected credentials in Fortinet FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17 allows at
cvelistv5nvd
CVE-2023-42789CRITICALCVSS 9.8≥ 2.0.0, ≤ 2.0.13≥ 7.0.0, ≤ 7.0.12+2 more2024-03-12
CVE-2023-42789 [CRITICAL] CWE-787 CVE-2023-42789: A out-of-bounds write in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7. A out-of-bounds write in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
cvelistv5nvd
CVE-2023-42790HIGHCVSS 8.1≥ 2.0.0, ≤ 2.0.13≥ 7.0.0, ≤ 7.0.12+2 more2024-03-12
CVE-2023-42790 [HIGH] CWE-121 CVE-2023-42790: A stack-based buffer overflow in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 th A stack-based buffer overflow in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
cvelistv5nvd
CVE-2024-23112MEDIUMCVSS 4.3≥ 7.0.0, ≤ 7.0.14≥ 7.2.0, ≤ 7.2.8+1 more2024-03-12
CVE-2024-23112 [MEDIUM] CWE-639 CVE-2024-23112: An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user’s bookmar
cvelistv5nvd
CVE-2023-29181HIGHCVSS 8.8≥ 1.0.0, < 2.0.13≥ 7.0.0, < 7.0.11+7 more2024-02-22
CVE-2023-29181 [HIGH] CWE-134 CVE-2023-29181: A use of externally-controlled format string in Fortinet FortiOS 7.2.0 through 7.2.4, 7.0.0 through A use of externally-controlled format string in Fortinet FortiOS 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM 1.0.0 through 1.0.3 allows atta
cvelistv5nvd