CVE-2023-22642Improper Certificate Validation in Fortinet Fortianalyzer

Severity
8.1HIGHNVD
CNA7.5
EPSS
0.2%
top 54.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 11

Description

An improper certificate validation vulnerability [CWE-295] in FortiAnalyzer and FortiManager 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4.8 through 6.4.10 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and the remote FortiGuard server hosting outbreakalert ressources.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages4 packages

CVEListV5fortinet/fortimanager6.4.06.4.*+3
NVDfortinet/fortimanager6.4.86.4.11+2
CVEListV5fortinet/fortianalyzer6.4.06.4.*+3
NVDfortinet/fortianalyzer6.4.86.4.11+2

🔴Vulnerability Details

2
GHSA
GHSA-4pv6-q257-8q33: An improper certificate validation vulnerability [CWE-295] in FortiAnalyzer and FortiManager 72023-04-11
CVEList
CVE-2023-22642: An improper certificate validation vulnerability [CWE-295] in FortiAnalyzer and FortiManager 72023-04-11

📋Vendor Advisories

1
Fortinet
Lack of client-side certificate validation when establishing secure connections with FortiGuard to download outbreakalert2023-04-11
CVE-2023-22642 — Improper Certificate Validation | cvebase