First published: Sat Jun 24 2006(Updated: )
The FTP proxy module in Fortinet FortiOS (FortiGate) before 2.80 MR12 and 3.0 MR2 allows remote attackers to bypass anti-virus scanning via the Enhanced Passive (EPSV) FTP mode.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | =3.0 | |
Fortinet FortiOS IPS Engine | =2.50 | |
Fortinet FortiOS IPS Engine | =3.0_mr1 | |
Fortinet FortiOS IPS Engine | =3.0_beta | |
Fortinet FortiOS IPS Engine | =2.80 | |
Fortinet FortiOS IPS Engine | =2.36 | |
Fortinet FortiOS IPS Engine | =2.8_mr10 | |
Fortinet FortiOS IPS Engine | =2.50_mr5 | |
Fortinet FortiOS IPS Engine | =2.5_0mr4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3222 is considered a medium-severity vulnerability that allows remote attackers to bypass anti-virus scanning in Fortinet FortiOS.
To fix CVE-2006-3222, upgrade Fortinet FortiOS to version 2.80 MR12 or later and 3.0 MR2 or later.
CVE-2006-3222 affects Fortinet FortiOS versions 2.5_0mr4, 2.8_mr10, 2.36, 2.50, 2.50_mr5, 2.80, and 3.0 beta.
CVE-2006-3222 facilitates remote attacks that can bypass the anti-virus scanning feature using the Enhanced Passive FTP mode.
As a temporary workaround for CVE-2006-3222, you should disable Enhanced Passive FTP mode in FortiOS until you can apply the necessary updates.