6.5
CVE-2022-27490
- EPSS 0.2%
- Veröffentlicht 07.03.2023 17:15:11
- Zuletzt bearbeitet 21.11.2024 06:55:49
- Quelle psirt@fortinet.com
- Teams Watchlist Login
- Unerledigt Login
A exposure of sensitive information to an unauthorized actor in Fortinet FortiManager version 6.0.0 through 6.0.4, FortiAnalyzer version 6.0.0 through 6.0.4, FortiPortal version 6.0.0 through 6.0.9, 5.3.0 through 5.3.8, 5.2.x, 5.1.0, 5.0.x, 4.2.x, 4.1.x, FortiSwitch version 7.0.0 through 7.0.4, 6.4.0 through 6.4.10, 6.2.x, 6.0.x allows an attacker which has obtained access to a restricted administrative account to obtain sensitive information via `diagnose debug` commands.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fortinet ≫ Fortianalyzer Version >= 5.6.0 <= 5.6.11
Fortinet ≫ Fortianalyzer Version >= 6.0.0 <= 6.0.4
Fortinet ≫ Fortimanager Version >= 5.6.0 <= 5.6.11
Fortinet ≫ Fortimanager Version >= 6.0.0 <= 6.0.4
Fortinet ≫ Fortiportal Version >= 4.1.0 <= 4.1.2
Fortinet ≫ Fortiportal Version >= 4.2.0 <= 4.2.2
Fortinet ≫ Fortiportal Version >= 5.0.0 <= 5.0.3
Fortinet ≫ Fortiportal Version >= 5.1.0 <= 5.1.2
Fortinet ≫ Fortiportal Version >= 5.2.0 <= 5.2.6
Fortinet ≫ Fortiportal Version >= 5.3.0 <= 5.3.8
Fortinet ≫ Fortiportal Version >= 6.0.0 <= 6.0.9
Fortinet ≫ Fortiswitch Version >= 6.0.0 <= 6.0.7
Fortinet ≫ Fortiswitch Version >= 6.2.0 <= 6.2.7
Fortinet ≫ Fortiswitch Version >= 6.4.0 <= 6.4.10
Fortinet ≫ Fortiswitch Version >= 7.0.0 <= 7.0.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.2% | 0.395 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
psirt@fortinet.com | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.