Vulnerability Details CVE-2023-50178
An improper certificate validation vulnerability [CWE-295] in FortiADC 7.4.0, 7.2.0 through 7.2.3, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and various remote servers such as private SDN connectors and FortiToken Cloud.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 20.5%
CVSS Severity
CVSS v3 Score 7.4
Products affected by CVE-2023-50178
-
cpe:2.3:a:fortinet:fortiadc:6.0.0
-
cpe:2.3:a:fortinet:fortiadc:6.0.1
-
cpe:2.3:a:fortinet:fortiadc:6.0.2
-
cpe:2.3:a:fortinet:fortiadc:6.0.3
-
cpe:2.3:a:fortinet:fortiadc:6.0.4
-
cpe:2.3:a:fortinet:fortiadc:6.1.0
-
cpe:2.3:a:fortinet:fortiadc:6.1.1
-
cpe:2.3:a:fortinet:fortiadc:6.1.2
-
cpe:2.3:a:fortinet:fortiadc:6.1.3
-
cpe:2.3:a:fortinet:fortiadc:6.1.4
-
cpe:2.3:a:fortinet:fortiadc:6.1.5
-
cpe:2.3:a:fortinet:fortiadc:6.1.6
-
cpe:2.3:a:fortinet:fortiadc:6.2.0
-
cpe:2.3:a:fortinet:fortiadc:6.2.1
-
cpe:2.3:a:fortinet:fortiadc:6.2.2
-
cpe:2.3:a:fortinet:fortiadc:6.2.3
-
cpe:2.3:a:fortinet:fortiadc:6.2.4
-
cpe:2.3:a:fortinet:fortiadc:6.2.5
-
cpe:2.3:a:fortinet:fortiadc:6.2.6
-
cpe:2.3:a:fortinet:fortiadc:7.0.0
-
cpe:2.3:a:fortinet:fortiadc:7.0.1
-
cpe:2.3:a:fortinet:fortiadc:7.0.2
-
cpe:2.3:a:fortinet:fortiadc:7.1.0
-
cpe:2.3:a:fortinet:fortiadc:7.1.1
-
cpe:2.3:a:fortinet:fortiadc:7.1.2
-
cpe:2.3:a:fortinet:fortiadc:7.1.3
-
cpe:2.3:a:fortinet:fortiadc:7.1.4
-
cpe:2.3:a:fortinet:fortiadc:7.2.0
-
cpe:2.3:a:fortinet:fortiadc:7.2.1
-
cpe:2.3:a:fortinet:fortiadc:7.2.2
-
cpe:2.3:a:fortinet:fortiadc:7.2.3
-
cpe:2.3:a:fortinet:fortiadc:7.4.0