First published: Tue Mar 01 2022(Updated: )
A improper handling of insufficient permissions or privileges in Fortinet FortiAnalyzer version 5.6.0 through 5.6.11, FortiAnalyzer version 6.0.0 through 6.0.11, FortiAnalyzer version 6.2.0 through 6.2.9, FortiAnalyzer version 6.4.0 through 6.4.7, FortiAnalyzer version 7.0.0 through 7 .0.2, FortiManager version 5.6.0 through 5.6.11, FortiManager version 6.0.0 through 6.0.11, FortiManager version 6.2.0 through 6.2.9, FortiManager version 6.4.0 through 6.4.7, FortiManager version 7.0.0 through 7.0.2 allows attacker to bypass the device policy and force the password-change action for its user.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=5.6.0<=5.6.11 | |
Fortinet FortiAnalyzer | >=6.0.0<=6.0.11 | |
Fortinet FortiAnalyzer | >=6.2.0<=6.2.9 | |
Fortinet FortiAnalyzer | >=6.4.0<=6.4.7 | |
Fortinet FortiAnalyzer | >=7.0.0<7.0.3 | |
Fortinet FortiManager | >=5.6.0<=5.6.11 | |
Fortinet FortiManager | >=6.0.0<=6.0.11 | |
Fortinet FortiManager | >=6.2.0<=6.2.9 | |
Fortinet FortiManager | >=6.4.0<=6.4.7 | |
Fortinet FortiManager | >=7.0.0<7.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22300 is a vulnerability in Fortinet FortiAnalyzer that improperly handles insufficient permissions or privileges.
Fortinet FortiAnalyzer versions 5.6.0 through 5.6.11, 6.0.0 through 6.0.11, 6.2.0 through 6.2.9, 6.4.0 through 6.4.7, and 7.0.0 through 7.0.2 are affected by CVE-2022-22300.
CVE-2022-22300 has a severity rating of 8.8 (high).
CVE-2022-22300 allows attackers to exploit insufficient permissions or privileges in Fortinet FortiAnalyzer, potentially leading to unauthorized access or unauthorized actions.
Yes, Fortinet has released patches to address CVE-2022-22300. It is recommended to update to the latest version of Fortinet FortiAnalyzer or apply the available patches.