Improper Certificate Validation in FortiADC by Fortinet
CVE-2023-50178
7.4HIGH
Summary
An improper certificate validation vulnerability in FortiADC could allow an unauthenticated remote attacker to execute a Man-in-the-Middle attack. This weakness affects communication channels between the FortiADC devices and remote servers, including those utilized for private SDN connectors and FortiToken Cloud services. Exploitation of this vulnerability may lead to unauthorized interception of sensitive data, posing a significant risk to organizations relying on FortiADC for secure network management.
Affected Version(s)
FortiADC 7.1.0
FortiADC 7.0.0 <= 7.0.2
FortiADC 6.2.0 <= 6.2.6
References
CVSS V3.1
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published