Full-text search. Typo-tolerant.

CVE-2023-27997 - [KEV] - CVSS 9.8

Overview

CVE-2023-27997 is a heap-based buffer overflow vulnerability in the SSL-VPN component of Fortinet FortiOS and FortiProxy. The flaw permits an unauthenticated, remote attacker to execute arbitrary code or commands by sending specifically crafted requests to a vulnerable SSL-VPN interface. With a CVSS score of 9.8 and an EPSS score of 0.891, the vulnerability represents a critical pre-authentication remote code execution risk against internet-facing perimeter devices. CISA added the CVE to its Known Exploited Vulnerabilities (KEV) catalog on 2023-06-13, and the entry is flagged as known to be used in ransomware campaigns, with a maturity status of widespread exploitation.

Affected Products

Any FortiGate or FortiProxy appliance exposing the SSL-VPN web portal (typically on TCP/443 or a custom port) should be considered in scope until patched to a fixed firmware build per Fortinet advisory FG-IR-23-097.

Exploitation Evidence

No direct exploitation telemetry, sample artifacts, or campaign indicators are present in the source dataset for this briefing. However, the CVE's inclusion in CISA KEV with a "widespread exploitation" maturity rating and its tagging as ransomware-associated indicate confirmed, repeated abuse in real-world intrusions. Operators of vulnerable devices should treat exposure as actively targeted rather than theoretical.

ATT&CK Mapping

No formal ATT&CK mappings are provided in the source data. Based on the vulnerability class and attack surface, the following techniques are technically applicable and should guide detection engineering:

Threat Actor Context

No specific threat actor attribution is included in the provided dataset. The CVE's ransomware-associated designation indicates that one or more ransomware operations have leveraged this flaw for initial access; defenders should assume both financially motivated and state-aligned interest in Fortinet SSL-VPN vulnerabilities, consistent with the broader historical targeting pattern of FortiOS edge devices.

Recommended Actions