vendor:
FortiOS, FortiProxy, FortiSwitchManager
by:
Felipe Alcantara (Filiplain)
8.8
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: FortiOS, FortiProxy, FortiSwitchManager
Affected Version From: 7.2.2000
Affected Version To: 7.0.6
Patch Exists: YES
Related CWE: CVE-2022-40684
CPE: a:fortinet:fortios:7.2.1
Tags: cve,cve2022,fortinet,fortigate,fortios,fortiproxy,auth-bypass,kev,intrusive
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://github.com/horizon3ai/CVE-2022-40684/blob/master/CVE-2022-40684.py, https://securityonline.info/researchers-have-developed-cve-2022-40684-poc-exploit-code/, https://socradar.io/what-do-you-need-to-know-about-fortinet-critical-authentication-bypass-vulnerability-cve-2022-40684/, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40684, https://nvd.nist.gov/vuln/detail/CVE-2022-40684
Nuclei Metadata: {'max-request': 2, 'vendor': 'fortinet', 'product': 'fortiproxy'}
Platforms Tested: Kali Linux
2022
Fortinet Authentication Bypass v7.2.1 – (FortiOS, FortiProxy, FortiSwitchManager)
A vulnerability in Fortinet products allows an attacker to bypass authentication and gain access to the system. This vulnerability affects FortiOS from 7.2.0 to 7.2.1, FortiOS from 7.0.0 to 7.0.6, FortiProxy 7.2.0, FortiProxy from 7.0.0 to 7.0.6, FortiSwitchManager 7.2.0, and FortiSwitchManager 7.0.0. An attacker can exploit this vulnerability by sending a specially crafted request to the target system. Successful exploitation of this vulnerability can result in unauthorized access to the system.
Mitigation:
Users should upgrade to the latest version of Fortinet products to mitigate this vulnerability.