Логотип exploitDog
bind:CVE-2024-50568
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-50568

Количество 3

Количество 3

nvd логотип

CVE-2024-50568

8 месяцев назад

A channel accessible by non-endpoint vulnerability [CWE-300] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7 and before 7.0.14 & FortiProxy version 7.4.0 through 7.4.3, 7.2.0 through 7.2.9 and before 7.0.16 allows an unauthenticated attacker with the knowledge of device specific data to spoof the identity of a downstream device of the security fabric via crafted TCP requests.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-q6xx-gv82-hc4m

8 месяцев назад

A channel accessible by non-endpoint vulnerability [CWE-300] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7 and before 7.0.14 & FortiProxy version 7.4.0 through 7.4.3, 7.2.0 through 7.2.9 and before 7.0.16 allows an unauthenticated attacker with the knowledge of device specific data to spoof the identity of a downstream device of the security fabric via crafted TCP requests.

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2025-12656

8 месяцев назад

Уязвимость графического интерфейса операционных систем Fortinet FortiOS и прокси-сервера для защиты от интернет-атак FortiProxy, позволяющая нарушителю выполнить атаку типа «человек посередине»

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-50568

A channel accessible by non-endpoint vulnerability [CWE-300] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7 and before 7.0.14 & FortiProxy version 7.4.0 through 7.4.3, 7.2.0 through 7.2.9 and before 7.0.16 allows an unauthenticated attacker with the knowledge of device specific data to spoof the identity of a downstream device of the security fabric via crafted TCP requests.

CVSS3: 5.9
0%
Низкий
8 месяцев назад
github логотип
GHSA-q6xx-gv82-hc4m

A channel accessible by non-endpoint vulnerability [CWE-300] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7 and before 7.0.14 & FortiProxy version 7.4.0 through 7.4.3, 7.2.0 through 7.2.9 and before 7.0.16 allows an unauthenticated attacker with the knowledge of device specific data to spoof the identity of a downstream device of the security fabric via crafted TCP requests.

CVSS3: 5.9
0%
Низкий
8 месяцев назад
fstec логотип
BDU:2025-12656

Уязвимость графического интерфейса операционных систем Fortinet FortiOS и прокси-сервера для защиты от интернет-атак FortiProxy, позволяющая нарушителю выполнить атаку типа «человек посередине»

CVSS3: 5.9
0%
Низкий
8 месяцев назад

Уязвимостей на страницу