FortiNAC 9.4.2 Auth JSP Call Access Control Bypass
CVE-2022-39946 Published on June 13, 2023
An access control vulnerability [CWE-284] in FortiNAC version 9.4.2 and below, version 9.2.7 and below, 9.1 all versions, 8.8 all versions, 8.7 all versions, 8.6 all versions, 8.5 all versions may allow a remote attacker authenticated on the administrative interface to perform unauthorized jsp calls via crafted HTTP requests.
Vulnerability Analysis
CVE-2022-39946 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
What is an Authorization Vulnerability?
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CVE-2022-39946 has been classified to as an Authorization vulnerability or weakness.
Products Associated with CVE-2022-39946
Want to know whenever a new CVE is published for Fortinet Fortinac? stack.watch will email you.
Affected Versions
Fortinet FortiNAC:- Version 9.4.0, <= 9.4.1 is affected.
- Version 9.2.0, <= 9.2.6 is affected.
- Version 9.1.0, <= 9.1.10 is affected.
- Version 8.8.0, <= 8.8.11 is affected.
- Version 8.7.0, <= 8.7.6 is affected.
- Version 8.6.0, <= 8.6.5 is affected.
- Version 8.5.0, <= 8.5.4 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.