CVE-2022-30306Stack-based Buffer Overflow in Fortinet Fortiweb

Severity
8.8HIGHNVD
CNA6.6
EPSS
0.7%
top 27.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 16

Description

A stack-based buffer overflow vulnerability [CWE-121] in the CA sign functionality of FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted password.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDfortinet/fortiweb6.3.66.3.20+5
CVEListV5fortinet/fortiweb7.0.07.0.1+2

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3wg4-69x5-5r76: A stack-based buffer overflow vulnerability [CWE-121] in the CA sign functionality of FortiWeb version 72023-02-16
CVEList
CVE-2022-30306: A stack-based buffer overflow vulnerability [CWE-121] in the CA sign functionality of FortiWeb version 72023-02-16

📋Vendor Advisories

1
Fortinet
A stack-based buffer overflow vulnerability [CWE-121] in the CA sign functionality of FortiWeb version 7.0.1 and below,...2023-02-16
CVE-2022-30306 — Stack-based Buffer Overflow | cvebase