First published: Tue Dec 06 2022(Updated: )
An improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability in Fortinet FortiADC version 7.1.0, version 7.0.0 through 7.0.2 and version 6.2.4 and below allows an authenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiADC | >=5.2.0<=6.2.4 | |
Fortinet FortiADC | =7.0.0 | |
Fortinet FortiADC | =7.0.1 | |
Fortinet FortiADC | =7.0.2 | |
Fortinet FortiADC | =7.1.0 |
Please upgrade to FortiADC version 7.1.1 or above Please upgrade to FortiADC version 7.0.3 or above Please upgrade to FortiADC version 6.2.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-33875 is an SQL Injection vulnerability in Fortinet FortiADC versions 7.1.0, 7.0.0 through 7.0.2, and 6.2.4 and below that allows an attacker to execute unauthorized code or commands.
CVE-2022-33875 has a severity rating of 8.8 (high).
CVE-2022-33875 affects Fortinet FortiADC versions 7.1.0, 7.0.0 through 7.0.2, and 6.2.4 and below.
An attacker can exploit CVE-2022-33875 by crafting specifically crafted HTTP requests to execute unauthorized code or commands.
Yes, Fortinet has released a fix for CVE-2022-33875. It is recommended to update to the latest version of Fortinet FortiADC.