An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/169431/Fortinet-FortiOS-FortiProxy-FortiSwitchManager-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/171515/Fortinet-7.2.1-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://fortiguard.com/psirt/FG-IR-22-377 | Mitigation Vendor Advisory |
http://packetstormsecurity.com/files/169431/Fortinet-FortiOS-FortiProxy-FortiSwitchManager-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/171515/Fortinet-7.2.1-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://fortiguard.com/psirt/FG-IR-22-377 | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-10-18 14:15
Updated : 2025-02-19 19:37
NVD link : CVE-2022-40684
Mitre link : CVE-2022-40684
CVE.ORG link : CVE-2022-40684
JSON object : View
Products Affected
fortinet
- fortiswitchmanager
- fortiproxy
- fortios
CWE
CWE-287
Improper Authentication