First published: Thu Feb 16 2023(Updated: )
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the management interface of FortiWAN 4.0.0 through 4.5.9 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWAN | >=4.0.0<=4.0.6 | |
Fortinet FortiWAN | >=4.5.0<4.5.10 | |
Fortinet FortiWAN | =4.1.1 | |
Fortinet FortiWAN | =4.1.2 | |
Fortinet FortiWAN | =4.1.3 | |
Fortinet FortiWAN | =4.2.1 | |
Fortinet FortiWAN | =4.2.2 | |
Fortinet FortiWAN | =4.2.5 | |
Fortinet FortiWAN | =4.2.6 | |
Fortinet FortiWAN | =4.2.7 | |
Fortinet FortiWAN | =4.3.0 | |
Fortinet FortiWAN | =4.3.1 | |
Fortinet FortiWAN | =4.4.0 | |
Fortinet FortiWAN | =4.4.1 |
Please upgrade to FortiWAN version 4.5.10 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-33869 has been classified with a high severity due to its potential impact on system security.
To fix CVE-2022-33869, upgrade your FortiWAN software to a version that is not affected by the vulnerability.
CVE-2022-33869 affects FortiWAN versions from 4.0.0 through 4.5.9.
CVE-2022-33869 cannot be exploited remotely as it requires authenticated access to the management interface.
CVE-2022-33869 is classified as an improper neutralization of special elements used in an OS command vulnerability.