9.8

CVE-2022-40684

Warning
Exploit

An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

Data is provided by the National Vulnerability Database (NVD)
FortinetFortiproxy Version >= 7.0.0 < 7.0.7
FortinetFortiproxy Version7.2.0
FortinetFortiswitchmanager Version7.0.0
FortinetFortiswitchmanager Version7.2.0
FortinetFortios Version >= 7.0.0 < 7.0.7
FortinetFortios Version >= 7.2.0 < 7.2.2

11.10.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Fortinet Multiple Products Authentication Bypass Vulnerability

Vulnerability

Fortinet FortiOS, FortiProxy, and FortiSwitchManager contain an authentication bypass vulnerability that could allow an unauthenticated attacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 94.43% 1
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
psirt@fortinet.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.