9.8

CVE-2022-42475

Warning
Media report
Exploit

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier  and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.

Data is provided by the National Vulnerability Database (NVD)
FortinetFortios Version >= 5.0.0 <= 5.0.14
FortinetFortios Version >= 5.2.0 <= 5.2.15
FortinetFortios Version >= 5.4.0 <= 5.4.13
FortinetFortios Version >= 5.6.0 <= 5.6.14
FortinetFortios Version >= 6.0.0 < 6.0.16
FortinetFortios Version >= 6.2.0 < 6.2.12
FortinetFortios Version >= 6.4.0 < 6.4.11
FortinetFortios Version >= 7.0.0 < 7.0.9
FortinetFortios Version >= 7.2.0 < 7.2.3
FortinetFortiproxy Version >= 1.0.0 <= 1.0.7
FortinetFortiproxy Version >= 1.1.0 <= 1.1.6
FortinetFortiproxy Version >= 1.2.0 <= 1.2.13
FortinetFortiproxy Version >= 2.0.0 < 2.0.12
FortinetFortiproxy Version >= 7.0.0 < 7.0.8
FortinetFortiproxy Version >= 7.2.0 < 7.2.2
FortinetFortios Version >= 6.0.0 < 6.0.15
   FortinetFim-7901e Version-
   FortinetFim-7904e Version-
   FortinetFim-7910e Version-
   FortinetFim-7920e Version-
   FortinetFim-7921f Version-
   FortinetFim-7941f Version-
   FortinetFortigate-6300f Version-
   FortinetFortigate-6300f-dc Version-
   FortinetFortigate-6500f Version-
   FortinetFortigate-6500f-dc Version-
   FortinetFortigate-6501f Version-
   FortinetFortigate-6501f-dc Version-
   FortinetFortigate-6601f Version-
   FortinetFortigate-6601f-dc Version-
   FortinetFortigate-7030e Version-
   FortinetFortigate-7040e Version-
   FortinetFortigate-7060e Version-
   FortinetFortigate-7121f Version-
   FortinetFpm-7620e Version-
   FortinetFpm-7620f Version-
   FortinetFpm-7630e Version-
FortinetFortios Version >= 6.2.0 < 6.2.12
   FortinetFim-7901e Version-
   FortinetFim-7904e Version-
   FortinetFim-7910e Version-
   FortinetFim-7920e Version-
   FortinetFim-7921f Version-
   FortinetFim-7941f Version-
   FortinetFortigate-6300f Version-
   FortinetFortigate-6300f-dc Version-
   FortinetFortigate-6500f Version-
   FortinetFortigate-6500f-dc Version-
   FortinetFortigate-6501f Version-
   FortinetFortigate-6501f-dc Version-
   FortinetFortigate-6601f Version-
   FortinetFortigate-6601f-dc Version-
   FortinetFortigate-7030e Version-
   FortinetFortigate-7040e Version-
   FortinetFortigate-7060e Version-
   FortinetFortigate-7121f Version-
   FortinetFpm-7620e Version-
   FortinetFpm-7620f Version-
   FortinetFpm-7630e Version-
FortinetFortios Version >= 6.4.0 < 6.4.10
   FortinetFim-7901e Version-
   FortinetFim-7904e Version-
   FortinetFim-7910e Version-
   FortinetFim-7920e Version-
   FortinetFim-7921f Version-
   FortinetFim-7941f Version-
   FortinetFortigate-6300f Version-
   FortinetFortigate-6300f-dc Version-
   FortinetFortigate-6500f Version-
   FortinetFortigate-6500f-dc Version-
   FortinetFortigate-6501f Version-
   FortinetFortigate-6501f-dc Version-
   FortinetFortigate-6601f Version-
   FortinetFortigate-6601f-dc Version-
   FortinetFortigate-7030e Version-
   FortinetFortigate-7040e Version-
   FortinetFortigate-7060e Version-
   FortinetFortigate-7121f Version-
   FortinetFpm-7620e Version-
   FortinetFpm-7620f Version-
   FortinetFpm-7630e Version-
FortinetFortios Version >= 7.0.0 < 7.0.8
   FortinetFim-7901e Version-
   FortinetFim-7904e Version-
   FortinetFim-7910e Version-
   FortinetFim-7920e Version-
   FortinetFim-7921f Version-
   FortinetFim-7941f Version-
   FortinetFortigate-6300f Version-
   FortinetFortigate-6300f-dc Version-
   FortinetFortigate-6500f Version-
   FortinetFortigate-6500f-dc Version-
   FortinetFortigate-6501f Version-
   FortinetFortigate-6501f-dc Version-
   FortinetFortigate-6601f Version-
   FortinetFortigate-6601f-dc Version-
   FortinetFortigate-7030e Version-
   FortinetFortigate-7040e Version-
   FortinetFortigate-7060e Version-
   FortinetFortigate-7121f Version-
   FortinetFpm-7620e Version-
   FortinetFpm-7620f Version-
   FortinetFpm-7630e Version-

13.12.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability

Vulnerability

Multiple versions of Fortinet FortiOS SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute arbitrary code or commands via specifically crafted requests.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 94% 0.999
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
psirt@fortinet.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-197 Numeric Truncation Error

Truncation errors occur when a primitive is cast to a primitive of a smaller size and data is lost in the conversion.

CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.