PatchSiren cyber security CVE debrief
CVE-2023-27997 Fortinet CVE debrief
CVE-2023-27997 is a heap-based buffer overflow in Fortinet FortiOS and FortiProxy SSL-VPN. CISA added it to the Known Exploited Vulnerabilities catalog on 2023-06-13 and set a remediation due date of 2023-07-04. Because it is publicly tracked as known exploited and flagged for known ransomware campaign use, it should be treated as an immediate patch-and-verify priority for any organization operating the affected Fortinet SSL-VPN services.
- Vendor
- Fortinet
- Product
- FortiOS and FortiProxy SSL-VPN
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2023-06-13
- Original CVE updated
- 2023-06-13
- Advisory published
- 2023-06-13
- Advisory updated
- 2023-06-13
Who should care
Security, network, and infrastructure teams responsible for Fortinet FortiOS or FortiProxy SSL-VPN; VPN appliance administrators; SOC and incident response teams; and asset owners who manage patch SLAs for externally reachable remote-access services.
Technical summary
The supplied records describe the issue as a heap-based buffer overflow affecting Fortinet's SSL-VPN functionality in FortiOS and FortiProxy. The corpus does not provide affected version ranges, exploitation mechanics, or proof-of-concept details. CISA's KEV entry identifies the vulnerability as known exploited and points to Fortinet PSIRT advisory FG-IR-23-097 for vendor instructions.
Defensive priority
Critical / immediate
Recommended defensive actions
- Apply Fortinet updates per vendor instructions and the referenced PSIRT advisory FG-IR-23-097.
- Inventory all FortiOS and FortiProxy SSL-VPN deployments, including appliances used for remote access, failover, or disaster recovery.
- Confirm whether any exposed VPN endpoints were running during the KEV due date window and review relevant authentication, VPN, and administrative logs for suspicious activity.
- If remediation cannot be completed immediately, follow vendor and CISA guidance for temporary risk reduction and restrict access to the VPN service as much as operationally possible.
- Escalate to incident response if there are signs of compromise, given CISA's KEV status and the 'known ransomware campaign use' flag.
Evidence notes
Evidence is limited to the supplied CVE record, the CISA KEV metadata, and the official reference links. The CVE was published and modified on 2023-06-13. CISA lists CVE-2023-27997 as a known exploited vulnerability, with a due date of 2023-07-04, and the supplied metadata marks known ransomware campaign use as 'Known'. The source metadata also references Fortinet PSIRT FG-IR-23-097 and the NVD record.
Official resources
-
CVE-2023-27997 CVE record
CVE.org
-
CVE-2023-27997 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
Publicly disclosed and published in the supplied records on 2023-06-13; CISA KEV listing was also added on 2023-06-13.