CVE-2022-42475

critical

Description

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.

From the Tenable Blog

CVE-2022-42475: Fortinet Patches Zero Day in FortiOS SSL VPNs
CVE-2022-42475: Fortinet Patches Zero Day in FortiOS SSL VPNs

Published: 2022-12-12

Fortinet has patched a zero day buffer overflow in FortiOS that could lead to remote code execution. There has been a report of active exploitation and organizations should patch urgently.

AA23-250A: Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475
AA23-250A: Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475

Published: 2023-09-07

A joint Cybersecurity Advisory examines the exploitation of two critical vulnerabilities by nation-state threat actors.

References

https://fortiguard.com/psirt/FG-IR-22-398

Details

Source: Mitre, NVD

Published: 2023-01-02

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical