First published: Tue Jun 07 2022(Updated: )
A path traversal vulnerability [CWE-22] in FortiAP-U CLI 6.2.0 through 6.2.3, 6.0.0 through 6.0.4, 5.4.0 through 5.4.6 may allow an admin user to delete and access unauthorized files and data via specifically crafted CLI commands.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAP-U | >=6.0.0<=6.0.4 | |
Fortinet FortiAP-U | >=6.2.0<=6.2.3 | |
Fortinet FortiAP-U | =5.4.0 | |
Fortinet FortiAP-U | =5.4.3 | |
Fortinet FortiAP-U | =5.4.4 | |
Fortinet FortiAP-U | =5.4.5 | |
Fortinet FortiAP-U | =5.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30301 is a path traversal vulnerability in FortiAP-U CLI versions 6.2.0 through 6.2.3, 6.0.0 through 6.0.4, and 5.4.0 through 5.4.6.
CVE-2022-30301 allows an admin user to delete and access unauthorized files and data in FortiAP-U CLI through specifically crafted CLI commands.
The severity of CVE-2022-30301 is high, with a CVSS score of 6.7.
FortiAP-U CLI versions 6.2.0 through 6.2.3, 6.0.0 through 6.0.4, and 5.4.0 through 5.4.6 are affected by CVE-2022-30301.
To fix the CVE-2022-30301 vulnerability, it is recommended to update FortiAP-U CLI to a version that is not affected. Please refer to the vendor's website for the latest updates and patches.