Lucene search

K
cveFortinetCVE-2022-22305
HistorySep 01, 2023 - 12:15 p.m.

CVE-2022-22305

2023-09-0112:15:08
CWE-295
CWE-297
fortinet
web.nvd.nist.gov
768
cve-2022-22305
cwe-295
fortimanager
fortianalyzer
fortios
fortisandbox
vulnerability
certificate validation
man-in-the-middle
nvd

CVSS3

5.4

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:U/RC:C

AI Score

4.6

Confidence

High

EPSS

0.001

Percentile

18.0%

An improper certificate validation vulnerability [CWE-295] in FortiManager 7.0.1 and below, 6.4.6 and below; FortiAnalyzer 7.0.2 and below, 6.4.7 and below; FortiOS 6.2.x and 6.0.x; FortiSandbox 4.0.x, 3.2.x and 3.1.x may allow a network adjacent and unauthenticated attacker to man-in-the-middle the communication between the listed products and some external peers.

Affected configurations

Nvd
Node
fortinetfortianalyzerRange6.0.06.0.12
OR
fortinetfortianalyzerRange6.2.96.4.7
OR
fortinetfortianalyzerMatch7.0.0
OR
fortinetfortianalyzerMatch7.0.1
OR
fortinetfortianalyzerMatch7.0.2
OR
fortinetfortimanagerRange6.0.06.0.12
OR
fortinetfortimanagerRange6.2.06.2.11
OR
fortinetfortimanagerRange6.4.06.4.6
OR
fortinetfortimanagerMatch7.0.0
OR
fortinetfortimanagerMatch7.0.1
OR
fortinetfortisandboxRange3.0.03.0.7
OR
fortinetfortisandboxRange3.1.03.1.5
OR
fortinetfortisandboxRange3.2.03.2.4
OR
fortinetfortisandboxMatch3.0.1
OR
fortinetfortisandboxMatch4.0.0
OR
fortinetfortisandboxMatch4.0.1
OR
fortinetfortisandboxMatch4.0.2
OR
fortinetfortiosRange5.6.105.6.14
OR
fortinetfortiosRange6.0.06.0.17
OR
fortinetfortiosRange6.2.06.2.15
VendorProductVersionCPE
fortinetfortianalyzer*cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
fortinetfortianalyzer7.0.0cpe:2.3:a:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*
fortinetfortianalyzer7.0.1cpe:2.3:a:fortinet:fortianalyzer:7.0.1:*:*:*:*:*:*:*
fortinetfortianalyzer7.0.2cpe:2.3:a:fortinet:fortianalyzer:7.0.2:*:*:*:*:*:*:*
fortinetfortimanager*cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
fortinetfortimanager7.0.0cpe:2.3:a:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*
fortinetfortimanager7.0.1cpe:2.3:a:fortinet:fortimanager:7.0.1:*:*:*:*:*:*:*
fortinetfortisandbox*cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
fortinetfortisandbox3.0.1cpe:2.3:a:fortinet:fortisandbox:3.0.1:*:*:*:*:*:*:*
fortinetfortisandbox4.0.0cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 131

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiAnalyzer",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.7",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.11",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.0.0",
        "lessThanOrEqual": "6.0.12",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Fortinet",
    "product": "FortiSandbox",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "4.0.0",
        "lessThanOrEqual": "4.0.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "3.2.0",
        "lessThanOrEqual": "3.2.4",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "3.1.0",
        "lessThanOrEqual": "3.1.5",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "3.0.0",
        "lessThanOrEqual": "3.0.7",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Fortinet",
    "product": "FortiManager",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.11",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.0.0",
        "lessThanOrEqual": "6.0.12",
        "status": "affected"
      }
    ]
  }
]

CVSS3

5.4

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:U/RC:C

AI Score

4.6

Confidence

High

EPSS

0.001

Percentile

18.0%