First published: Thu Feb 16 2023(Updated: )
An improper restriction of xml external entity reference in Fortinet FortiNAC version 9.4.0 through 9.4.1, FortiNAC version 9.2.0 through 9.2.7, FortiNAC version 9.1.0 through 9.1.8, FortiNAC version 8.8.0 through 8.8.11, FortiNAC version 8.7.0 through 8.7.6, FortiNAC version 8.6.0 through 8.6.5, FortiNAC version 8.5.0 through 8.5.4, FortiNAC version 8.3.7 allows attacker to read arbitrary files or trigger a denial of service via specifically crafted XML documents.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiNAC | >=8.3.7<=9.2.7 | |
Fortinet FortiNAC | >=9.4.0<9.4.2 | |
Fortinet FortiNAC | <7.2.0 |
Please upgrade to FortiNAC version 9.4.2 or above Please upgrade to FortiNAC version 7.2.0 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39954 has a high severity rating due to its potential for remote code execution through improper XML external entity reference handling.
To fix CVE-2022-39954, update Fortinet FortiNAC to versions 9.4.2 or later, or to the latest version within the specified ranges.
CVE-2022-39954 affects Fortinet FortiNAC versions from 8.3.7 up to 9.4.1, and various earlier versions.
Yes, CVE-2022-39954 is exploitable remotely if the vulnerable versions of FortiNAC are exposed to untrusted XML entities.
If immediate update is not possible, review your configurations to limit exposure and monitor for unusual activity related to FortiNAC.