CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
17.7%
An improperly implemented security check for standard vulnerability [CWE-358] in FortiADC Web Application Firewall (WAF) 7.4.0 through 7.4.4, 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions, 6.0 all versions when cookie security policy is enabled may allow an attacker, under specific conditions, to retrieve the initial encrypted and signed cookie protected by the feature
[
{
"vendor": "Fortinet",
"product": "FortiADC",
"cpes": [
"cpe:2.3:h:fortinet:fortiadc:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.2.7:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.2.6:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.2.5:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.1.6:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.1.4:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc:6.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"versions": [
{
"versionType": "semver",
"version": "7.4.0",
"lessThanOrEqual": "7.4.4",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.2.0",
"lessThanOrEqual": "7.2.7",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.1.0",
"lessThanOrEqual": "7.1.4",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.0.0",
"lessThanOrEqual": "7.0.5",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.2.0",
"lessThanOrEqual": "6.2.6",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.1.0",
"lessThanOrEqual": "6.1.6",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.0.0",
"lessThanOrEqual": "6.0.4",
"status": "affected"
}
]
}
]