Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-27997: Execute unauthorized code or commands in Fortinet FortiOS-6K7K

0
Critical
VulnerabilityCVE-2023-27997cvecve-2023-27997
Published: Tue Jun 13 2023 (06/13/2023, 08:41:47 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS-6K7K

Description

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.

AI-Powered Analysis

AILast updated: 10/28/2025, 23:01:16 UTC

Technical Analysis

CVE-2023-27997 is a heap-based buffer overflow vulnerability identified in Fortinet FortiOS and FortiProxy SSL-VPN products. The flaw exists in multiple versions of FortiOS (including 6.0.10 through 7.0.10) and FortiProxy (up to 7.2.3 and earlier), allowing remote attackers to execute arbitrary code or commands by sending specially crafted requests to the vulnerable SSL-VPN service. The vulnerability does not require any authentication or user interaction, making it highly exploitable over the network. The underlying issue is a heap buffer overflow (CWE-122), which can be triggered remotely, leading to potential full system compromise. The CVSS v3.1 base score is 9.2, reflecting critical severity with network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no active exploits have been reported in the wild, the vulnerability's characteristics make it a prime target for attackers seeking to gain unauthorized access or disrupt services. Fortinet SSL-VPN appliances are widely deployed in enterprise and government networks worldwide, including Europe, often protecting remote access to sensitive internal resources. The vulnerability's exploitation could lead to unauthorized data access, disruption of VPN services, and lateral movement within networks. Fortinet has released patches for affected versions, but organizations running unpatched versions remain vulnerable. Due to the critical nature and ease of exploitation, immediate remediation is essential.

Potential Impact

For European organizations, exploitation of CVE-2023-27997 could result in complete compromise of Fortinet SSL-VPN appliances, which are often used to secure remote access to corporate and governmental networks. This could lead to unauthorized disclosure of sensitive data, disruption of remote access services, and potential lateral movement by attackers within internal networks. Critical sectors such as finance, healthcare, government, and telecommunications that rely on Fortinet devices for secure connectivity are at heightened risk. The vulnerability's remote, unauthenticated exploit vector increases the likelihood of attacks originating from external threat actors, including cybercriminals and state-sponsored groups. Disruption or compromise of VPN infrastructure could also impact business continuity and regulatory compliance, especially under GDPR and other data protection frameworks. The absence of known exploits in the wild currently provides a window for proactive patching, but the critical severity demands urgent attention to avoid potential breaches.

Mitigation Recommendations

1. Immediately identify and inventory all Fortinet FortiOS and FortiProxy SSL-VPN devices in your environment to determine exposure. 2. Apply the latest Fortinet patches that address CVE-2023-27997 as soon as they become available; prioritize upgrading to versions above the affected ones listed. 3. Restrict access to SSL-VPN interfaces by implementing network segmentation and firewall rules to limit exposure to trusted IP addresses only. 4. Monitor network traffic for unusual or malformed requests targeting SSL-VPN services that could indicate exploitation attempts. 5. Enable and review detailed logging on Fortinet devices to detect suspicious activity related to SSL-VPN access. 6. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect attempts to exploit this vulnerability. 7. Conduct regular vulnerability scans and penetration tests focusing on VPN infrastructure to ensure no residual exposure. 8. Educate security teams about this vulnerability and ensure incident response plans include scenarios involving VPN appliance compromise. 9. Consider deploying multi-factor authentication (MFA) on VPN access to add an additional security layer, although this does not mitigate the vulnerability itself. 10. Stay informed through Fortinet advisories and trusted cybersecurity sources for any emerging exploit reports or additional mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2023-03-09T10:09:33.119Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9a7247d717aace218ea

Added to database: 10/21/2025, 7:06:15 PM

Last enriched: 10/28/2025, 11:01:16 PM

Last updated: 10/30/2025, 2:17:04 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats