CVE-2023-42785
FortiOS vulnerability analysis and mitigation

Overview

A null pointer dereference vulnerability (CVE-2023-42785) was identified in FortiOS SSL-VPN component. The vulnerability affects multiple versions of FortiOS including versions 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0 all versions, 6.4 all versions, 6.2 all versions, and 6.0 all versions. The vulnerability was discovered by security researcher Qian Chen from Codesafe Team of Legendsec at QI-ANXIN Group and was initially published on January 14, 2025 (Fortiguard PSIRT).

Technical details

The vulnerability is classified as a null pointer dereference [CWE-476] in the SSL-VPN component of FortiOS. It has been assigned a CVSSv3 score of 6.4, indicating a medium severity level. The vulnerability allows a remote attacker with low privileges to trigger the vulnerability through a crafted HTTP request (Fortiguard PSIRT).

Impact

When successfully exploited, this vulnerability can lead to a denial of service condition by causing the VPN service to crash. This could potentially disrupt SSL-VPN services for legitimate users of affected FortiOS systems (Fortiguard PSIRT).

Mitigation and workarounds

Fortinet has released patches to address this vulnerability. Users of FortiOS 7.4.0-7.4.1 should upgrade to version 7.4.2 or above, while users of FortiOS 7.2.0-7.2.5 should upgrade to version 7.2.6 or above. Users of FortiOS versions 7.0, 6.4, 6.2, and 6.0 should migrate to a fixed release. Additionally, FortiSASE version 23.4 has been remediated in Q4/23. Fortinet provides an upgrade tool to help users follow the recommended upgrade path (Fortiguard PSIRT).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management