Vulnerability Description
An improper access control vulnerability [CWE-284] in FortiOS version 7.2.0, version 7.0.13 and below, version 6.4.14 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below may allow a remote unauthenticated attacker to bypass the firewall deny geolocalisation policy via timing the bypass with a GeoIP database update.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortiproxy | >= 2.0.0, <= 2.0.12 |
| Fortinet | Fortios | >= 6.4.0, <= 6.4.14 |
Related Weaknesses (CWE)
References
- https://fortiguard.com/psirt/FG-IR-23-432Vendor Advisory
- https://fortiguard.com/psirt/FG-IR-23-432Vendor Advisory
FAQ
What is CVE-2023-47536?
CVE-2023-47536 is a vulnerability with a CVSS score of 3.1 (LOW). An improper access control vulnerability [CWE-284] in FortiOS version 7.2.0, version 7.0.13 and below, version 6.4.14 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version...
How severe is CVE-2023-47536?
CVE-2023-47536 has been rated LOW with a CVSS base score of 3.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-47536?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortiproxy, Fortinet Fortios.