Lucene search

K
nvd[email protected]NVD:CVE-2022-40684
HistoryOct 18, 2022 - 2:15 p.m.

CVE-2022-40684

2022-10-1814:15:09
CWE-287
web.nvd.nist.gov
1
cve-2022-40684
fortinet
fortios
fortiproxy
fortiswitchmanager
authentication bypass
cwe-288
unauthenticated attacker
administrative interface
http requests
https requests

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.974 High

EPSS

Percentile

99.9%

An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

Affected configurations

NVD
Node
fortinetfortiproxyRange7.0.0–7.0.7
OR
fortinetfortiproxyMatch7.2.0
OR
fortinetfortiswitchmanagerMatch7.0.0
OR
fortinetfortiswitchmanagerMatch7.2.0
OR
fortinetfortiosRange7.0.0–7.0.7
OR
fortinetfortiosRange7.2.0–7.2.2

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.974 High

EPSS

Percentile

99.9%