Fortinet has released a patch to fix a critical vulnerability (CVE-2023-27997) in its FortiOS and FortiProxy SSL-VPN, which may have been exploited in attacks targeting government, manufacturing, and critical infrastructure.


In a separate blog released by Fortinet, the security solution company clarifies, “At this time, we are not linking FG-IR-23-097 to the Volt Typhoon campaign. However, Fortinet expects all threat actors, including those behind the Volt Typhoon campaign, to continue exploiting unpatched vulnerabilities in widely used software and devices.”

_____________________________

A. Nature of Vulnerability

CVE-2023-27997

  • A heap-based buffer overflow vulnerability in FortiOS and FortiProxy SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.

_____________________________

B. Affected Product Version

FortiOS-6K7K version 7.0.10
FortiOS-6K7K version 7.0.5
FortiOS-6K7K version 6.4.12
FortiOS-6K7K version 6.4.10
FortiOS-6K7K version 6.4.8
FortiOS-6K7K version 6.4.6
FortiOS-6K7K version 6.4.2
FortiOS-6K7K version 6.2.9 through 6.2.13
FortiOS-6K7K version 6.2.6 through 6.2.7
FortiOS-6K7K version 6.2.4
FortiOS-6K7K version 6.0.12 through 6.0.16
FortiOS-6K7K version 6.0.10
FortiProxy version 7.2.0 through 7.2.3
FortiProxy version 7.0.0 through 7.0.9
FortiProxy version 2.0.0 through 2.0.12
FortiProxy 1.2 all versions
FortiProxy 1.1 all versions
FortiOS version 7.2.0 through 7.2.4
FortiOS version 7.0.0 through 7.0.11
FortiOS version 6.4.0 through 6.4.12
FortiOS version 6.0.0 through 6.0.16

C. Actions to be Taken

CERT-PH recommends the following actions be taken:

  • CERT-PH encourages all Fortinet users to review and apply the necessary update to mitigate future threats.
  • Regularly check and apply the latest patch of software, especially to public-facing applications.
  • Proactively monitor and secure identified systems and devices for any suspicious/malicious activities.
  • For additional information, kindly refer to the official report:
    • https://www.fortiguard.com/psirt/FG-IR-23-097
    • https://www.fortinet.com/blog/psirt-blogs/analysis-of-cve-2023-27997-and-clarifications-on-volt-typhoon-campaign