We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-40684



Description

An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

Reserved 2022-09-14 | Published 2022-10-18 | Updated 2024-10-23 | Assigner fortinet


CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C

CISA Known Exploited Vulnerability

Date added 2022-10-11 | Due date 2022-11-01

Known Ransomware Campaign(s)

Apply updates per vendor instructions.

Problem types

Execute unauthorized code or commands

Product status

FortiOS 7.2.1, 7.2.0, 7.0.6, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, 7.0.0; FortiProxy 7.2.0, 7.0.6, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, 7.0.0; FortiSwitchManager 7.2.0, 7.0.0
affected

References

fortiguard.com/psirt/FG-IR-22-377

packetstormsecurity.com/...anager-Authentication-Bypass.html

packetstormsecurity.com/...-7.2.1-Authentication-Bypass.html

cve.org (CVE-2022-40684)

nvd.nist.gov (CVE-2022-40684)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-40684

Support options

Helpdesk Chat, Email, Knowledgebase