First published: Thu Feb 16 2023(Updated: )
A stack-based buffer overflow vulnerability [CWE-121] in the CA sign functionality of FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted password.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.3.6<6.3.20 | |
Fortinet FortiWeb | =6.4.0 | |
Fortinet FortiWeb | =6.4.1 | |
Fortinet FortiWeb | =6.4.2 | |
Fortinet FortiWeb | =7.0.0 | |
Fortinet FortiWeb | =7.0.1 |
Please upgrade to FortiWeb version 7.0.2 or above Please upgrade to FortiWeb version 6.3.20 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-30306.
The severity of CVE-2022-30306 is high with a CVSS score of 8.8.
The affected software is Fortinet FortiWeb versions 6.3.6 to 6.3.20, 6.4.0 to 6.4.2, and 7.0.0 to 7.0.1.
The vulnerability occurs in the CA sign functionality of FortiWeb and is caused by a stack-based buffer overflow.
An authenticated attacker can exploit CVE-2022-30306 by using a specifically crafted password to achieve arbitrary code execution.