Lucene search

K
thnThe Hacker NewsTHN:6A1A5F396F8A43A1DA67A07FF545680A
HistoryDec 13, 2022 - 3:34 a.m.

Fortinet Warns of Active Exploitation of New SSL-VPN Pre-auth RCE Vulnerability

2022-12-1303:34:00
The Hacker News
thehackernews.com
72
cve-2022-42475
heap-based buffer overflow
emergency patches
critical bug
unauthenticated attacker
arbitrary code
exploitation
fortios
fortios-6k7k
indicators of compromise

0.974 High

EPSS

Percentile

99.9%

SSL-VPN Pre-auth RCE Vulnerability

Fortinet on Monday issued emergency patches for a severe security flaw affecting its FortiOS SSL-VPN product that it said is being actively exploited in the wild.

Tracked as CVE-2022-42475 (CVSS score: 9.3), the critical bug relates to a heap-based buffer overflow vulnerability that could allow an unauthenticated attacker to execute arbitrary code via specially crafted requests.

The company said it’s β€œaware of an instance where this vulnerability was exploited in the wild,” urging customers to move quickly to apply the updates.

The following products are impacted by the issue -

  • FortiOS version 7.2.0 through 7.2.2
  • FortiOS version 7.0.0 through 7.0.8
  • FortiOS version 6.4.0 through 6.4.10
  • FortiOS version 6.2.0 through 6.2.11
  • FortiOS-6K7K version 7.0.0 through 7.0.7
  • FortiOS-6K7K version 6.4.0 through 6.4.9
  • FortiOS-6K7K version 6.2.0 through 6.2.11
  • FortiOS-6K7K version 6.0.0 through 6.0.14

Patches are available in FortiOS versions 7.2.3, 7.0.9, 6.4.11, and 6.2.12 as well as FortiOS-6K7K versions 7.0.8, 6.4.10, 6.2.12, and 6.0.15.

SSL-VPN Pre-auth RCE Vulnerability

The American network security company has also published indicators of compromise (IoCs) associated with the exploitation attempts, including the IP addresses and the artifacts that are present in the file system post a successful attack.

The advisory comes two months after Fortinet warned of active weaponization of another critical authentication bypass bug in FortiOS, FortiProxy, and FortiSwitchManager (CVE-2022-40684, CVSS score: 9.6).

Found this article interesting? Follow us on Twitter ο‚™ and LinkedIn to read more exclusive content we post.