⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2022-11-01.
CVE-2022-40684
Severity
9.8CRITICAL
EPSS
94.4%
top 0.02%
CISA KEV
KEVRansomware
Added 2022-10-11
Due 2022-11-01
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
KEV addedOct 11
PublishedOct 18
KEV dueNov 1
Latest updateApr 16
CISA Required Action: Apply updates per vendor instructions.
Description
An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
🔴Vulnerability Details
3💥Exploits & PoCs
4🔍Detection Rules
4Suricata
▶
Suricata▶
ET WEB_SERVER Successful FortiOS Auth Bypass Attempt - Administrative Details Leaked (CVE-2022-40684)↗2022-10-17
Suricata
▶
📋Vendor Advisories
2🕵️Threat Intelligence
2Threat Intel▶
Belsen Group