8.6
CVE-2022-26122
- EPSS 0.11%
- Published 02.11.2022 12:15:52
- Last modified 21.11.2024 06:53:28
- Source psirt@fortinet.com
- Teams watchlist Login
- Open Login
An insufficient verification of data authenticity vulnerability [CWE-345] in FortiClient, FortiMail and FortiOS AV engines version 6.2.168 and below and version 6.4.274 and below may allow an attacker to bypass the AV engine via manipulating MIME attachment with junk and pad characters in base64.
Data is provided by the National Vulnerability Database (NVD)
Fortinet ≫ Antivirus Engine Version0.4.23
Fortinet ≫ Antivirus Engine Version2.0.49
Fortinet ≫ Antivirus Engine Version2.0.60
Fortinet ≫ Antivirus Engine Version4.4.54
Fortinet ≫ Antivirus Engine Version6.33
Fortinet ≫ Antivirus Engine Version6.137
Fortinet ≫ Antivirus Engine Version6.142
Fortinet ≫ Antivirus Engine Version6.144
Fortinet ≫ Antivirus Engine Version6.145
Fortinet ≫ Antivirus Engine Version6.156
Fortinet ≫ Antivirus Engine Version6.157
Fortinet ≫ Antivirus Engine Version6.243
Fortinet ≫ Antivirus Engine Version6.252
Fortinet ≫ Antivirus Engine Version6.253
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.11% | 0.304 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.6 | 3.9 | 4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
|
psirt@fortinet.com | 4.7 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
|
CWE-345 Insufficient Verification of Data Authenticity
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.