Lucene search

K
cveFortinetCVE-2023-22637
HistoryMay 03, 2023 - 10:15 p.m.

CVE-2023-22637

2023-05-0322:15:17
CWE-79
fortinet
web.nvd.nist.gov
25
cve-2023-22637
cross-site scripting
cwe-79
fortinac-f
fortinac
remote code execution
nvd

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.001

Percentile

51.2%

An improper neutralization of input during web page generation (‘Cross-site Scripting’) vulnerability [CWE-79] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in License Management would permit an authenticated attacker to trigger remote code execution via crafted licenses.

Affected configurations

Nvd
Node
fortinetfortinacRange8.7.09.4.3
OR
fortinetfortinac-fMatch7.2.0
VendorProductVersionCPE
fortinetfortinac*cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*
fortinetfortinac-f7.2.0cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiNAC",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "9.4.0",
        "lessThanOrEqual": "9.4.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "9.2.0",
        "lessThanOrEqual": "9.2.7",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "9.1.0",
        "lessThanOrEqual": "9.1.9",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "8.8.0",
        "lessThanOrEqual": "8.8.11",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "8.7.0",
        "lessThanOrEqual": "8.7.6",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.001

Percentile

51.2%

Related for CVE-2023-22637