CVE-2023-27997

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below,...

Basic Information

CVE State
PUBLISHED
Reserved Date
March 09, 2023
Published Date
June 13, 2023
Last Updated
October 23, 2024
Vendor
Fortinet
Product
FortiOS-6K7K, FortiProxy, FortiOS
Description
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.
Tags
ios cisa malware ransomware edge

CVSS Scores

CVSS v3.1

9.2 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:R

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2023-06-13 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2023-06-22 14:16:44 UTC) Source
Used in Malware
Yes (added 2023-06-13 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2023-06-13 00:00:00 UTC

Recent Mentions

Fortinet has observed threat actors exploiting CVE-2025-32756, a critical zero-day arbitrary code execution vulnerability which affects multiple Fortinet products including FortiVoice, FortiMail, FortiNDR, FortiRecorder and FortiCamera.BackgroundOn May 13th, Fortinet published a security advisory (FG-IR-25-254) for CVE-2025-32756, a critical arbitrary code execution vulnerability affecting multiple Fortinet products.CVEDescriptionCVSSv3CVE-2025-32756An arbitrary code execution vulnerability in FortiVoice, FortiMail, FortiNDR, FortiRecorder and FortiCamera9.6AnalysisCVE-2025-32756 is an arbitrary code execution vulnerability affecting multiple Fortinet products including FortiVoice, FortiMail, FortiNDR, FortiRecorder and FortiCamera. A remote unauthenticated attacker can send crafted HTTP requests in order to create a stack-based overflow condition which would allow for the execution of arbitrary code. This vulnerability was discovered by the Fortinet Product Security Team who observed threat activity involving a device running FortiVoice.According to Fortinet, the threat actors operations included scanning the network, erasing system crashlogs and enabling ‘fcgi debugging’ which is used to log authentication attempts, including SSH logins. The ‘fcgi debugging’ option is not enabled by default and the Fortinet advisory recommends reviewing the setting as one possible indicator of compromise (IoC).Historical Exploitation of Fortinet DevicesFortinet vulnerabilities have historically been common targets for cyber attackers, and CVE-2025-32756 is the eighteenth Fortinet vulnerability to be added to the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) list.CVEDescriptionPatchedTenable BlogCVE-2024-55591Fortinet Authentication Bypass in FortiOS and FortiProxyJanuary 2025CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the WildCVE-2024-21762Fortinet FortiOS Out-of-bound Write Vulnerability...

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

delsploit/CVE-2023-27997

Type: github • Created: 2023-10-12 17:50:38 UTC • Stars: 9

imbas007/CVE-2023-27997-Check

Type: github • Created: 2023-06-22 14:16:44 UTC • Stars: 1

BishopFox/CVE-2023-27997-check

Type: github • Created: 2023-06-16 20:15:36 UTC • Stars: 133

Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing

rio128128/CVE-2023-27997-POC

Type: github • Created: 2023-06-16 03:25:19 UTC • Stars: 27

POC FortiOS SSL-VPN buffer overflow vulnerability

Timeline

  • CVE ID Reserved

  • Exploit Used in Malware

  • Added to KEVIntel

  • CVE Published to Public

  • Proof of Concept Exploit Available