CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
57.5%
An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component 7.2.0, 7.0.0 through 7.0.7, 6.4.0 through 6.4.9, 6.2 all versions, 6.0 all versions and FortiProxy SSH login component 7.0.0 through 7.0.5, 2.0.0 through 2.0.10, 1.2.0 all versions may allow a remote and unauthenticated attacker to login into the device via sending specially crafted Access-Challenge response from the Radius server.
[
{
"vendor": "Fortinet",
"product": "FortiOS",
"defaultStatus": "unaffected",
"versions": [
{
"version": "7.2.0",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.0.0",
"lessThanOrEqual": "7.0.6",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.4.0",
"lessThanOrEqual": "6.4.9",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.2.0",
"lessThanOrEqual": "6.2.12",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.0.0",
"lessThanOrEqual": "6.0.15",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.2.0",
"lessThan": "6.2.*",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.0.0",
"lessThan": "6.0.*",
"status": "affected"
}
]
},
{
"vendor": "Fortinet",
"product": "FortiProxy",
"defaultStatus": "unaffected",
"versions": [
{
"versionType": "semver",
"version": "7.0.0",
"lessThanOrEqual": "7.0.5",
"status": "affected"
},
{
"versionType": "semver",
"version": "2.0.0",
"lessThanOrEqual": "2.0.10",
"status": "affected"
},
{
"versionType": "semver",
"version": "1.2.0",
"lessThanOrEqual": "1.2.13",
"status": "affected"
}
]
}
]