First published: Tue Jul 11 2023(Updated: )
An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in FortiExtender management interface 7.0.0 through 7.0.3, 4.2.0 through 4.2.4, 4.1.1 through 4.1.8, 4.0.0 through 4.0.2, 3.3.0 through 3.3.2, 3.2.1 through 3.2.3, 5.3 all versions may allow an unauthenticated and remote attacker to retrieve arbitrary files from the underlying filesystem via specially crafted web requests.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiextender Firmware | >=3.2.1<3.2.4 | |
Fortinet Fortiextender Firmware | >=4.0.0<4.0.3 | |
Fortinet Fortiextender Firmware | >=4.1.1<4.1.9 | |
Fortinet Fortiextender Firmware | >=4.2.0<4.2.5 | |
Fortinet Fortiextender Firmware | >=7.0.0<7.0.4 | |
Fortinet Fortiextender Firmware | =5.3.2 | |
Fortinet FortiExtender |
Please upgrade to FortiExtender version 7.2.0 or above Please upgrade to FortiExtender version 7.0.4 or above Please upgrade to FortiExtender version 4.2.5 or above Please upgrade to FortiExtender version 4.1.9 or above Please upgrade to FortiExtender version 4.0.3 or above Please upgrade to FortiExtender version 3.3.3 or above Please upgrade to FortiExtender version 3.2.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23447 is classified as a high severity vulnerability due to its potential for path traversal exploitation.
CVE-2022-23447 affects FortiExtender management interface versions 3.2.1 to 3.2.4, 4.0.0 to 4.0.3, 4.1.1 to 4.1.9, 4.2.0 to 4.2.5, and 7.0.0 to 7.0.4.
To remediate CVE-2022-23447, upgrade the FortiExtender firmware to the latest version available beyond the affected versions.
A path traversal vulnerability, such as CVE-2022-23447, allows an attacker to access files and directories outside of the intended directory structure.
Yes, CVE-2022-23447 can potentially be exploited remotely if an attacker interacts with the vulnerable FortiExtender management interface.