CVE-2022-40684

critical

Description

An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

From the Tenable Blog

CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxy
CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxy

Published: 2022-10-07

Fortinet has patched a critical authentication bypass in its FortiOS and FortiProxy products that could lead to administrator access.

References

http://packetstormsecurity.com/files/169431/Fortinet-FortiOS-FortiProxy-FortiSwitchManager-Authentication-Bypass.html

http://packetstormsecurity.com/files/171515/Fortinet-7.2.1-Authentication-Bypass.html

https://fortiguard.com/psirt/FG-IR-22-377

Details

Source: Mitre, NVD

Published: 2022-10-18

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical