First published: Tue Dec 06 2022(Updated: )
A improper neutralization of input during web page generation ('cross-site scripting') [CWE-79] in FortiOS may allow a privileged attacker to perform a stored XSS attack via storing malicious payloads in replacement messages.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | >=6.0.7<=6.0.15 | |
Fortinet FortiOS | >=6.2.2<=6.2.12 | |
Fortinet FortiOS | >=6.4.0<=6.4.9 | |
Fortinet FortiOS | >=7.0.0<=7.0.3 |
Please upgrade to FortiOS version 7.2.2 Please upgrade to FortiOS version 7.0.7 Please upgrade to FortiOS version 6.4.10 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-40680.
The severity of CVE-2022-40680 is medium (5.4).
Fortinet FortiOS versions 6.0.7 - 6.0.15, 6.2.2 - 6.2.12, 6.4.0 - 6.4.9, and 7.0.0 - 7.0.3 are affected by CVE-2022-40680.
CVE-2022-40680 allows a privileged attacker to execute unauthorized code or commands via storing malicious payloads in replacement messages.
You can find more information about CVE-2022-40680 at the following link: https://fortiguard.com/psirt/FG-IR-21-248