Heap buffer overflow in sslvpn pre-authentication

Summary

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS and FortiProxy SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.

Workaround:

Disable SSL-VPN.

Version Affected Solution
FortiOS 7.4 Not affected Not Applicable
FortiOS 7.2 7.2.0 through 7.2.4 Upgrade to 7.2.5 or above
FortiOS 7.0 7.0.0 through 7.0.11 Upgrade to 7.0.12 or above
FortiOS 6.4 6.4.0 through 6.4.12 Upgrade to 6.4.13 or above
FortiOS 6.2 6.2.0 through 6.2.13 Upgrade to 6.2.14 or above
FortiOS 6.0 6.0.0 through 6.0.16 Upgrade to 6.0.17 or above
FortiOS-6K7K 7.0 7.0.10 Upgrade to 7.0.12 or above
FortiOS-6K7K 7.0 7.0.5 Upgrade to 7.0.12 or above
FortiOS-6K7K 6.4 6.4.12 Upgrade to 6.4.13 or above
FortiOS-6K7K 6.4 6.4.10 Upgrade to 6.4.13 or above
FortiOS-6K7K 6.4 6.4.8 Upgrade to 6.4.13 or above
FortiOS-6K7K 6.4 6.4.6 Upgrade to 6.4.13 or above
FortiOS-6K7K 6.4 6.4.2 Upgrade to 6.4.13 or above
FortiOS-6K7K 6.2 6.2.9 through 6.2.13 Upgrade to 6.2.15 or above
FortiOS-6K7K 6.2 6.2.6 through 6.2.7 Upgrade to 6.2.15 or above
FortiOS-6K7K 6.2 6.2.4 Upgrade to 6.2.15 or above
FortiOS-6K7K 6.0 6.0.12 through 6.0.16 Upgrade to 6.0.17 or above
FortiOS-6K7K 6.0 6.0.10 Upgrade to 6.0.17 or above
FortiProxy 7.2 7.2.0 through 7.2.3 Upgrade to 7.2.4 or above
FortiProxy 7.0 7.0.0 through 7.0.9 Upgrade to 7.0.10 or above
FortiProxy 2.0 2.0.0 through 2.0.12 Upgrade to 2.0.13 or above
FortiProxy 1.2 1.2 all versions Migrate to a fixed release
FortiProxy 1.1 1.1 all versions Migrate to a fixed release
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Acknowledgement

Fortinet is pleased to thank Charles Fol and Dany Bach from LEXFO for bringing this issue to our attention under responsible disclosure.

Timeline

2023-06-12: Initial publication