Home Fortinet CVE-2023-33308
Back to Fortinet

CVE-2023-33308

FortiOS - Firewall

Fortinet CVSS 9.8 Updated March 18, 2026

Executive Risk Summary

"A stack-based overflow vulnerability in Fortinet FortiOS versions 7.0.0 through 7.0.10 and 7.2.0 through 7.2.3 allows a remote unauthenticated attacker to execute arbitrary code or command via crafted packets. This vulnerability poses a critical risk to the security and integrity of the affected systems, as it can be exploited to gain unauthorized access and control."

Operational Audit Arsenal

Target Type Firmware Image
Target Asset FortiOS
Standard Path Global Firmware

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

High

Internal Work Notes

Urgent: FortiOS vulnerability CVE-2023-33308 - Remote code execution possible, patching required ASAP

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Fortinet FortiproxyFortinet Fortiproxy (Version 7.2.2)Fortinet Fortiproxy (Version 7.2.0)Fortinet FortiosFortinet Fortiproxy (Version 7.2.1)

Original NVD Description

"A stack-based overflow vulnerability [CWE-124] in Fortinet FortiOS version 7.0.0 through 7.0.10 and 7.2.0 through 7.2.3 and FortiProxy version 7.0.0 through 7.0.9 and 7.2.0 through 7.2.2 allows a remote unauthenticated attacker to execute arbitrary code or command via crafted packets reaching proxy policies or firewall policies with proxy mode alongside deep or full packet inspection."

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.