Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-44247: Execute unauthorized code or commands in Fortinet FortiOS

0
Medium
VulnerabilityCVE-2023-44247cvecve-2023-44247
Published: Tue May 14 2024 (05/14/2024, 16:19:13 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

A double free vulnerability [CWE-415] vulnerability in Fortinet FortiOS 6.4 all versions may allow a privileged attacker to execute code or commands via crafted HTTP or HTTPs requests.

AI-Powered Analysis

AILast updated: 12/19/2025, 09:11:27 UTC

Technical Analysis

CVE-2023-44247 is a double free vulnerability identified in Fortinet FortiOS version 6.4.0, a widely used network security operating system powering Fortinet's firewall and security appliances. The vulnerability arises from improper memory management where the same memory is freed twice, leading to undefined behavior that can be exploited by attackers. A privileged attacker can leverage this flaw by sending specially crafted HTTP or HTTPS requests to the FortiOS device, triggering the double free condition. This can result in the execution of arbitrary code or commands with elevated privileges, potentially allowing full control over the affected device. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting medium severity due to the requirement for high privileges and high attack complexity, but with significant impact on confidentiality, integrity, and availability if exploited. No user interaction is required, and the scope remains unchanged within the vulnerable component. Although no known exploits have been reported in the wild, the critical role FortiOS devices play in network security makes this vulnerability a serious concern. Fortinet has not yet published a patch or mitigation guidance at the time of this report, emphasizing the need for vigilance and proactive defense measures.

Potential Impact

For European organizations, exploitation of CVE-2023-44247 could lead to unauthorized control over FortiOS devices, which are often deployed as perimeter firewalls, VPN gateways, and intrusion prevention systems. Successful exploitation could compromise network security, allowing attackers to bypass security controls, intercept or manipulate sensitive data, disrupt network availability, or pivot to other internal systems. This poses a significant risk to confidentiality, integrity, and availability of critical business and governmental operations. Sectors such as finance, healthcare, energy, and telecommunications, which rely heavily on Fortinet products for secure network infrastructure, are particularly vulnerable. The medium severity rating suggests that while exploitation is not trivial, the potential damage to European organizations' cybersecurity posture is substantial, especially given the strategic importance of Fortinet devices in defending against cyber threats.

Mitigation Recommendations

1. Immediately inventory all Fortinet FortiOS devices to identify those running version 6.4.0. 2. Monitor Fortinet’s official advisories for patches or updates addressing CVE-2023-44247 and apply them promptly once available. 3. Restrict administrative access to FortiOS management interfaces to trusted networks and users using network segmentation and strong authentication mechanisms such as multi-factor authentication. 4. Implement strict firewall rules to limit HTTP/HTTPS management access only to necessary sources. 5. Enable and review detailed logging and alerting on FortiOS devices to detect unusual or malformed HTTP/HTTPS requests that could indicate exploitation attempts. 6. Conduct regular vulnerability scans and penetration tests focusing on FortiOS devices to identify potential exploitation vectors. 7. Consider deploying network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 8. Educate security teams about the nature of double free vulnerabilities and the specific risks associated with FortiOS to enhance incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2023-09-27T12:26:48.749Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6945133ec326d36e536dfec8

Added to database: 12/19/2025, 8:56:30 AM

Last enriched: 12/19/2025, 9:11:27 AM

Last updated: 12/19/2025, 11:09:13 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats