First published: Tue Mar 07 2023(Updated: )
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in Fortinet FortiProxy version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.7, FortiOS version 7.2.0 through 7.2.3 and 7.0.0 through 7.0.9 allows an unauthenticated attackers to obtain sensitive logging informations on the device via crafted HTTP GET requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=7.0.0<=7.0.8 | |
Fortinet FortiProxy | >=7.2.0<=7.2.2 | |
Fortinet FortiOS | >=6.2.3<=6.2.13 | |
Fortinet FortiOS | >=6.4.0<=6.4.11 | |
Fortinet FortiOS | >=7.0.0<=7.0.9 | |
Fortinet FortiOS | >=7.2.0<=7.2.3 |
Please upgrade to FortiProxy version 7.2.2 or above Please upgrade to FortiProxy version 7.0.8 or above Please upgrade to FortiOS version 7.2.4 or above Please upgrade to FortiOS version 7.0.10 or above Please upgrade to FortiOS version 6.4.11 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41329 is an exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiProxy and FortiOS.
CVE-2022-41329 affects Fortinet FortiProxy version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.7.
CVE-2022-41329 affects Fortinet FortiOS version 7.2.0 through 7.2.3 and 7.0.0 through 7.0.9.
CVE-2022-41329 has a severity score of 5.3 (Medium).
To fix CVE-2022-41329, update Fortinet FortiProxy to version 7.2.2 or higher and update Fortinet FortiOS to version 7.2.3 or higher.