Vulnerability Details CVE-2018-13383
A heap buffer overflow in Fortinet FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.10, 5.4.0 through 5.4.12, 5.2.14 and earlier and FortiProxy 2.0.0, 1.2.8 and earlier in the SSL VPN web portal may cause the SSL VPN web service termination for logged in users due to a failure to properly handle javascript href data when proxying webpages.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.011
EPSS Ranking 77.2%
CVSS Severity
CVSS v3 Score 4.3
CVSS v2 Score 4.3
Proposed Action
A heap buffer overflow in Fortinet FortiOS and FortiProxy may cause the SSL VPN web service termination for logged in users.
Ransomware Campaign
Known
Products affected by CVE-2018-13383
-
cpe:2.3:a:fortinet:fortiproxy:1.0.0
-
cpe:2.3:a:fortinet:fortiproxy:1.0.1
-
cpe:2.3:a:fortinet:fortiproxy:1.0.2
-
cpe:2.3:a:fortinet:fortiproxy:1.0.3
-
cpe:2.3:a:fortinet:fortiproxy:1.0.4
-
cpe:2.3:a:fortinet:fortiproxy:1.0.5
-
cpe:2.3:a:fortinet:fortiproxy:1.0.6
-
cpe:2.3:a:fortinet:fortiproxy:1.0.7
-
cpe:2.3:a:fortinet:fortiproxy:1.1.0
-
cpe:2.3:a:fortinet:fortiproxy:1.1.1
-
cpe:2.3:a:fortinet:fortiproxy:1.1.2
-
cpe:2.3:a:fortinet:fortiproxy:1.1.3
-
cpe:2.3:a:fortinet:fortiproxy:1.1.4
-
cpe:2.3:a:fortinet:fortiproxy:1.1.5
-
cpe:2.3:a:fortinet:fortiproxy:1.1.6
-
cpe:2.3:a:fortinet:fortiproxy:1.2.0
-
cpe:2.3:a:fortinet:fortiproxy:1.2.1
-
cpe:2.3:a:fortinet:fortiproxy:1.2.2
-
cpe:2.3:a:fortinet:fortiproxy:1.2.3
-
cpe:2.3:a:fortinet:fortiproxy:1.2.4
-
cpe:2.3:a:fortinet:fortiproxy:1.2.5
-
cpe:2.3:a:fortinet:fortiproxy:1.2.6
-
cpe:2.3:a:fortinet:fortiproxy:1.2.7
-
cpe:2.3:a:fortinet:fortiproxy:1.2.8
-
cpe:2.3:a:fortinet:fortiproxy:2.0.0
-
cpe:2.3:o:fortinet:fortios:5.2.0
-
cpe:2.3:o:fortinet:fortios:5.2.1
-
cpe:2.3:o:fortinet:fortios:5.2.10
-
cpe:2.3:o:fortinet:fortios:5.2.11
-
cpe:2.3:o:fortinet:fortios:5.2.12
-
cpe:2.3:o:fortinet:fortios:5.2.13
-
cpe:2.3:o:fortinet:fortios:5.2.14
-
cpe:2.3:o:fortinet:fortios:5.2.2
-
cpe:2.3:o:fortinet:fortios:5.2.3
-
cpe:2.3:o:fortinet:fortios:5.2.4
-
cpe:2.3:o:fortinet:fortios:5.2.5
-
cpe:2.3:o:fortinet:fortios:5.2.6
-
cpe:2.3:o:fortinet:fortios:5.2.7
-
cpe:2.3:o:fortinet:fortios:5.2.8
-
cpe:2.3:o:fortinet:fortios:5.2.9
-
cpe:2.3:o:fortinet:fortios:5.4.0
-
cpe:2.3:o:fortinet:fortios:5.4.1
-
cpe:2.3:o:fortinet:fortios:5.4.10
-
cpe:2.3:o:fortinet:fortios:5.4.11
-
cpe:2.3:o:fortinet:fortios:5.4.12
-
cpe:2.3:o:fortinet:fortios:5.4.2
-
cpe:2.3:o:fortinet:fortios:5.4.3
-
cpe:2.3:o:fortinet:fortios:5.4.4
-
cpe:2.3:o:fortinet:fortios:5.4.5
-
cpe:2.3:o:fortinet:fortios:5.4.6
-
cpe:2.3:o:fortinet:fortios:5.4.7
-
cpe:2.3:o:fortinet:fortios:5.4.8
-
cpe:2.3:o:fortinet:fortios:5.4.9
-
cpe:2.3:o:fortinet:fortios:5.6.0
-
cpe:2.3:o:fortinet:fortios:5.6.1
-
cpe:2.3:o:fortinet:fortios:5.6.10
-
cpe:2.3:o:fortinet:fortios:5.6.2
-
cpe:2.3:o:fortinet:fortios:5.6.3
-
cpe:2.3:o:fortinet:fortios:5.6.4
-
cpe:2.3:o:fortinet:fortios:5.6.5
-
cpe:2.3:o:fortinet:fortios:5.6.6
-
cpe:2.3:o:fortinet:fortios:5.6.7
-
cpe:2.3:o:fortinet:fortios:5.6.8
-
cpe:2.3:o:fortinet:fortios:5.6.9
-
cpe:2.3:o:fortinet:fortios:6.0.0
-
cpe:2.3:o:fortinet:fortios:6.0.1
-
cpe:2.3:o:fortinet:fortios:6.0.2
-
cpe:2.3:o:fortinet:fortios:6.0.3
-
cpe:2.3:o:fortinet:fortios:6.0.4