First published: Mon Oct 10 2022(Updated: )
An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=7.0.0<7.0.7 | |
Fortinet FortiProxy | =7.2.0 | |
Fortinet FortiSwitchManager | =7.0.0 | |
Fortinet FortiSwitchManager | =7.2.0 | |
Fortinet FortiOS | >=7.0.0<7.0.7 | |
Fortinet FortiOS | >=7.2.0<7.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for the Fortinet authentication bypass vulnerability is CVE-2022-40684.
The Fortinet authentication bypass vulnerability affects FortiOS, FortiProxy, and FortiSwitchManager, which are part of the Fortinet Multiple Products.
The authentication bypass vulnerability in Fortinet Multiple Products allows an unauthenticated attacker to perform operations on the administrative interface through crafted HTTP or HTTPS requests.
No, authentication is not required to exploit the Fortinet authentication bypass vulnerability.
You can find more information about the Fortinet authentication bypass vulnerability at the following reference: [Fortinet PSIRT Advisory FG-IR-22-377](https://www.fortiguard.com/psirt/FG-IR-22-377).