⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2022-39952

Severity
9.8CRITICAL
EPSS
93.8%
top 0.14%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedFeb 16
Latest updateFeb 24

Description

A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP request.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDfortinet/fortinac9.1.09.1.8+3
CVEListV5fortinet/fortinac9.2.09.2.5+7

🔴Vulnerability Details

3
GHSA
GHSA-4wjq-4wff-qw9c: A external control of file name or path in Fortinet FortiNAC versions 92023-02-16
CVEList
CVE-2022-39952: A external control of file name or path in Fortinet FortiNAC versions 92023-02-16
VulnCheck
Fortinet fortinac External Control of File Name or Path2022

💥Exploits & PoCs

1
Nuclei
Fortinet FortiNAC - Arbitrary File Write

🔍Detection Rules

1
Suricata
ET EXPLOIT Fortinet FortiNAC - Observed POST .zip with Vulnerable Parameter (CVE-2022-39952)2023-02-21

📋Vendor Advisories

1
Fortinet
A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8...2023-02-16

🕵️Threat Intelligence

5
Sentinelone
CVE-2022-39952: Fortinet FortiNAC Remote Code Execution Vulnerability2023-02-24
Sentinelone
CVE-2022-39952: Fortinet FortiNAC Remote Code Execution Vulnerability2023-02-24
Fortinet
Perspectives: FortiNAC and CVE-2022-39952 | Fortinet Blog2023-02-23
Recorded Future
CVE-2022-39952: Pre-authentication Code-execution Vulnerability | Recorded Future
Recorded Future
CVE-2022-39952: Pre-authentication Code-execution Vulnerability
CVE-2022-39952 (CRITICAL CVSS 9.8) | A external control of file name or | cvebase.io