{"uuid": "26fb2e3f-4940-48ec-a600-9d29b91d0b57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42475", "type": "published-proof-of-concept", "source": "https://t.me/ptswarm/176", "content": "Xortigate, or CVE-2023-27997 - The Rumoured RCE That Was\n\n\ud83d\udc64 by Aliz Hammond \n\nWhen Lexfo Security teased a critical pre-authentication RCE bug in FortiGate devices on Saturday 10th, many people speculated on the practical impact of the bug. Would this be a true, sky-is-falling level vulnerability like the recent CVE-2022-42475? Or was it some edge-case hole, requiring some unusual and exotic requisite before any exposure? Others even went further, questioning the legitimacy of the bug itself. Details were scarce and guesswork was rife.\n\nThe watchTowr's team successfully reproduced the CVE-2023-27997 vulnerability and published detailed blogpost with a Python PoC for crashing the target device.\n\n\ud83d\udcdd Contents:\n\u25cf Patch Diffing \n\u25cf Exploitation\n\u25cf Impact\n\u25cf Rapid Response\n\nhttps://labs.watchtowr.com/xortigate-or-cve-2023-27997/", "creation_timestamp": "2023-06-13T05:39:23.000000Z"}