First published: Thu Feb 16 2023(Updated: )
An improper certificate validation vulnerability [CWE-295] in FortiOS 7.2.0 through 7.2.3, 7.0.0 through 7.0.7, 6.4 all versions, 6.2 all versions, 6.0 all versions and FortiProxy 7.0.0 through 7.0.6, 2.0 all versions, 1.2 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiOS/FortiProxy device and remote servers hosting threat feeds (when the latter are configured as Fabric connectors in FortiOS/FortiProxy)
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=1.2.0<=2.0.9 | |
Fortinet FortiProxy | >=7.0.0<7.0.7 | |
Fortinet FortiOS | >=6.0.0<7.0.8 | |
Fortinet FortiOS | >=7.2.0<7.2.4 |
Please upgrade to FortiProxy version 7.2.0 or above Please upgrade to FortiProxy version 7.0.7 or above Please upgrade to FortiOS version 7.2.4 or above Please upgrade to FortiOS version 7.0.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39948 is an improper certificate validation vulnerability in FortiOS and FortiProxy.
CVE-2022-39948 has a severity rating of 7.4 (high).
CVE-2022-39948 affects FortiOS versions 6.0.0 to 7.0.7 and FortiProxy versions 1.2.0 to 2.0.9.
CVE-2022-39948 is classified under CWE-295 (Improper Certificate Validation).
To fix the CVE-2022-39948 vulnerability, it is recommended to update FortiOS and FortiProxy to the latest versions provided by Fortinet.