QID 43919

Date Published: 2022-10-17

QID 43919: FortiOS Transmission Control Protocol (TCP) Middlebox Reflection Vulnerability (FG-IR-22-073)

An improper verification of source of a communication channel vulnerability [CWE-940] in FortiOS may allow a remote and unauthenticated attacker to trigger the sending of "blocked page" HTML data to an arbitrary victim via crafted TCP requests, potentially flooding the victim. This is possible only if at least a firewall policy has inspection mode set to flow-based (default), AND at least a Security Profile is enabled (Web Filter, AntiVirus, IPS, DLP, Application Control, SSL, File filter).

Affected Products:
FortiOS version 7.2.0
FortiOS version 7.0.0 through 7.0.5
FortiOS version 6.4.0 through 6.4.8
FortiOS version 6.2.0 through 6.2.10
FortiOS version 6.0.0 through 6.0.14

QID Detection Logic (Authenticated):
Detection checks for vulnerable version of FortiOS.

Note: Detection is made potential because, the signature doesn't check if at least a firewall policy has inspection mode set to flow-based, AND at least a Security Profile is enabled .

Vulnerable version of FortiOSmay allow a remote and unauthenticated attacker to trigger the sending of "blocked page" HTML data to an arbitrary victim via crafted TCP requests, potentially flooding the victim.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 7.8 severity.
  • Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-22-086

    Vendor References

    CVEs related to QID 43919

    Software Advisories
    Advisory ID Software Component Link
    FG-IR-22-073 URL Logo www.fortiguard.com/psirt/FG-IR-22-073