CERT-In Vulnerability Note
CIVN-2022-0383
Authentication Bypass Vulnerability in Fortinet Products
Original Issue Date:October 11, 2022
Severity Rating: CRITICAL
Systems Affected
- FortiOS versions 7.0.0 to 7.06 and 7.20 to 7.2.1
- FortiProxy versions 7.0.0 to 7.0.6 and 7.2.0
- FortiSwitchManager version 7.2.0 and 7.0.0
Overview
A vulnerability has been reported in FortiOS, FortiProxy and FortiSwitchManager, which could allow an unauthenticated remote attacker to bypass security restrictions on the targeted system.
Description
This vulnerability exists in FortiOS, FortiProxy and FortiSwitchManager. An attacker could exploit this vulnerability by sending specially crafted HTTP or HTTPS requests and could perform operations on the administrative interface.
Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to Bypass security restrictions on the targeted system.
Solution
Upgrade to the latest versions of FortiOS, FortiProxy and FortiSwitchManager as mentioned in the vendor advisory
https://www.fortiguard.com/psirt/FG-IR-22-377
Vendor Information
Fortiguard
https://www.fortiguard.com/psirt/FG-IR-22-377
References
https://www.darkreading.com/vulnerabilities-threats/patch-now-fortinet-fortigate-and-fortiproxy-contain-critical-vuln
https://www.fortiguard.com/psirt/FG-IR-22-377
CVE Name
CVE-2022-40684
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|