First published: Thu Feb 16 2023(Updated: )
A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP request.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiNAC | >=8.3.7<=8.8.9 | |
Fortinet FortiNAC | >=9.1.0<9.1.8 | |
Fortinet FortiNAC | >=9.2.0<9.2.6 | |
Fortinet FortiNAC | >=9.4.0<9.4.1 |
Please upgrade to FortiNAC version 9.4.1 or above Please upgrade to FortiNAC version 9.2.6 or above Please upgrade to FortiNAC version 9.1.8 or above Please upgrade to FortiNAC version 7.2.0 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39952 is a vulnerability that allows an unauthenticated attacker to execute unauthorized code or commands in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, and 8.3.7.
The severity of CVE-2022-39952 is critical with a severity value of 9.8.
CVE-2022-39952 affects Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, and 8.3.7 by allowing an unauthenticated attacker to execute unauthorized code or commands.
No, authentication is not required to exploit CVE-2022-39952.
To fix CVE-2022-39952, it is recommended to upgrade Fortinet FortiNAC to a version that is not affected by the vulnerability.