CVE-2022-27491Fortinet Fortios vulnerability

4 documents4 sources
Severity
7.5HIGHNVD
CNA6.8
EPSS
0.1%
top 81.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 6
Latest updateSep 7

Description

A improper verification of source of a communication channel in Fortinet FortiOS with IPS engine version 7.201 through 7.214, 7.001 through 7.113, 6.001 through 6.121, 5.001 through 5.258 and before 4.086 allows a remote and unauthenticated attacker to trigger the sending of "blocked page" HTML data to an arbitrary victim via crafted TCP requests, potentially flooding the victim.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDfortinet/fortios6.2.06.2.11+4
CVEListV5fortinet/fortinet_fortiosFortiOS 7.2.0, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, 7.0.0, 6.4.9, 6.4.8, 6.4.7, 6.4.6, 6.4.5, 6.4.4, 6.4.3, 6.4.2, 6.4.1, 6.4.0, 6.2.10, 6.2.9, 6.2.8, 6.2.7, 6.2.6, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.0.14, 6.0.13, 6.0.12, 6.0.11, 6.0.10, 6.0.9, 6.0.8, 6.0.7, 6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0

🔴Vulnerability Details

2
GHSA
GHSA-x3p7-q669-8j5v: A improper verification of source of a communication channel in Fortinet FortiOS with IPS engine version 72022-09-07
CVEList
CVE-2022-27491: A improper verification of source of a communication channel in Fortinet FortiOS with IPS engine version 72022-09-06

📋Vendor Advisories

1
Fortinet
TCP Middlebox Reflection2022-09-06
CVE-2022-27491 — Fortinet Fortios vulnerability | cvebase