CVE-2022-35843Improper Access Control in Fortinet Fortios

Severity
9.8CRITICALNVD
CNA8.1
EPSS
0.5%
top 33.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 6

Description

An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component 7.2.0, 7.0.0 through 7.0.7, 6.4.0 through 6.4.9, 6.2 all versions, 6.0 all versions and FortiProxy SSH login component 7.0.0 through 7.0.5, 2.0.0 through 2.0.10, 1.2.0 all versions may allow a remote and unauthenticated attacker to login into the device via sending specially crafted Access-Challenge response from the Radius server.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

CVEListV5fortinet/fortios6.2.06.2.*+6
NVDfortinet/fortios6.0.06.0.15+5
CVEListV5fortinet/fortiproxy7.0.07.0.5+2
NVDfortinet/fortiproxy1.2.01.2.13+2

Patches

🔴Vulnerability Details

2
GHSA
GHSA-h7pw-vp92-fggq: An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component 72022-12-06
CVEList
CVE-2022-35843: An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component 72022-12-06

📋Vendor Advisories

1
Fortinet
SSH authentication bypass when RADIUS authentication is used2022-12-06
CVE-2022-35843 — Improper Access Control in Fortinet | cvebase