First published: Mon Jul 18 2022(Updated: )
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiEDR version 5.1.0, 5.0.0 through 5.0.3 Patch 6 and 4.0.0 allows a remote authenticated attacker to perform a reflected cross site scripting attack (XSS) by injecting malicious payload into the Management Console via various endpoints.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiedr | >=5.0.0<5.0.3 | |
Fortinet Fortiedr | =4.0.0 | |
Fortinet Fortiedr | =5.0.3 | |
Fortinet Fortiedr | =5.0.3-patch1 | |
Fortinet Fortiedr | =5.0.3-patch2 | |
Fortinet Fortiedr | =5.0.3-patch3 | |
Fortinet Fortiedr | =5.0.3-patch4 | |
Fortinet Fortiedr | =5.0.3-patch5 | |
Fortinet Fortiedr | =5.0.3-patch6 | |
Fortinet Fortiedr | =5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Fortinet FortiEDR vulnerability is CVE-2022-29057.
CVE-2022-29057 has a severity rating of 5.4 (Medium).
CVE-2022-29057 affects Fortinet FortiEDR version 5.1.0, and versions 5.0.0 through 5.0.3 Patch 6 and 4.0.0.
CVE-2022-29057 allows a remote authenticated attacker to perform a reflected cross-site scripting (XSS) attack on Fortinet FortiEDR by injecting a malicious payload into the Man...
Yes, Fortinet has released patches to address CVE-2022-29057. It is recommended to apply the latest patch for the affected Fortinet FortiEDR versions.