First published: Tue Mar 07 2023(Updated: )
A improper limitation of a pathname to a restricted directory vulnerability ('path traversal') [CWE-22] in Fortinet FortiOS version 7.2.0 through 7.2.3, 7.0.0 through 7.0.9 and before 6.4.11 allows a privileged attacker to read and write files on the underlying Linux system via crafted CLI commands.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | ||
Fortinet FortiOS | >=6.0.0<=6.0.16 | |
Fortinet FortiOS | >=6.2.0<=6.2.13 | |
Fortinet FortiOS | >=6.4.0<=6.4.11 | |
Fortinet FortiOS | >=7.0.0<=7.0.9 | |
Fortinet FortiOS | >=7.2.0<=7.2.3 | |
Fortinet FortiOS | >=6.2.0<6.2.14 | |
Fortinet FortiOS | >=6.4.0<6.4.12 | |
Fortinet FortiOS | >=7.0.0<7.0.10 | |
Fortinet FortiOS | >=7.2.0<7.2.4 |
Please upgrade to FortiOS version 7.2.4 or above Please upgrade to FortiOS version 7.0.10 or above Please upgrade to FortiOS version 6.4.12 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-41328 is a path traversal vulnerability in Fortinet FortiOS that allows a local privileged attacker to read and write files via crafted CLI commands.
CVE-2022-41328 affects Fortinet FortiOS by allowing a local privileged attacker to read and write files through specially crafted CLI commands.
Yes, Fortinet FortiOS is the only affected software by CVE-2022-41328.
The severity of CVE-2022-41328 is not specified in the provided information.
For information on available fixes for CVE-2022-41328, please refer to the reference provided in the description.