CVE-2022-40684

Scores

EPSS

0.944High94.4%
0%20%40%60%80%100%

Percentile: 94.4%

CVSS

9.8Critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-287

Related Vulnerabilities

Exploits

Exploit ID: CVE-2022-40684

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Exploit ID: 51092

Source: exploitdb

URL: https://www.exploit-db.com/exploits/51092

Exploit ID: 52239

Source: exploitdb

URL: https://www.exploit-db.com/exploits/52239

Vulnerable Software (3)

Type: Configuration

Vendor: fortinet

Product: fortios

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.7",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    }...

Source: nvd

Type: Configuration

Vendor: fortinet

Product: fortiproxy

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.7",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    }...

Source: nvd

Type: Configuration

Vendor: fortinet

Product: fortiswitchmanager

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.7",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    }...

Source: nvd