fortinet fortiswitchmanager CVE-2022-40684 vulnerability in Fortinet Products
Published on October 18, 2022

An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

Vendor Advisory NVD

Known Exploited Vulnerability

This Fortinet Multiple Products Authentication Bypass Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Fortinet FortiOS, FortiProxy, and FortiSwitchManager contain an authentication bypass vulnerability that could allow an unauthenticated attacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

The following remediation steps are recommended / required by November 1, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2022-40684 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

What is an authentification Vulnerability?

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE-2022-40684 has been classified to as an authentification vulnerability or weakness.


Products Associated with CVE-2022-40684

You can be notified by stack.watch whenever vulnerabilities like CVE-2022-40684 are published in these products:

 
 
 

What versions are vulnerable to CVE-2022-40684?