CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RC:R
AI Score
Confidence
Low
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
An improper validation of integrity check value vulnerability [CWE-354] in FortiOS 7.2.0 through 7.2.3, 7.0.0 through 7.0.12, 6.4 all versions, 6.2 all versions, 6.0 all versions and FortiProxy 7.2 all versions, 7.0 all versions, 2.0 all versions VMs may allow a local attackerΒ with admin privileges to boot a malicious image on the device and bypass the filesystem integrity check in place.
[
{
"cpes": [
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*"
],
"vendor": "fortinet",
"product": "fortios",
"versions": [
{
"status": "affected",
"version": "2.0.0",
"versionType": "semver",
"lessThanOrEqual": "2.0.13"
},
{
"status": "affected",
"version": "6.0.0",
"versionType": "semver",
"lessThanOrEqual": "6.0.17"
},
{
"status": "affected",
"version": "6.2.0",
"versionType": "semver",
"lessThanOrEqual": "6.2.15"
},
{
"status": "affected",
"version": "6.4.0",
"versionType": "semver",
"lessThanOrEqual": "6.4.14"
},
{
"status": "affected",
"version": "7.0.0",
"versionType": "semver",
"lessThanOrEqual": "7.0.12"
},
{
"status": "affected",
"version": "7.0.0",
"versionType": "semver",
"lessThanOrEqual": "7.0.13"
},
{
"status": "affected",
"version": "7.2.0",
"versionType": "semver",
"lessThanOrEqual": "7.2.3"
},
{
"status": "affected",
"version": "7.2.0",
"versionType": "semver",
"lessThanOrEqual": "7.2.7"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RC:R
AI Score
Confidence
Low
SSVC
Exploitation
none
Automatable
no
Technical Impact
total