First published: Tue Apr 11 2023(Updated: )
A permissive list of allowed inputs vulnerability [CWE-183] in FortiGate version 7.2.3 and below, version 7.0.9 and below Policy-based NGFW Mode may allow an authenticated SSL-VPN user to bypass the policy via bookmarks in the web portal.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | >=7.0.0<7.0.11 | |
Fortinet FortiOS | >=7.2.0<7.2.4 |
Please upgrade to FortiOS version 7.2.4 or above Please upgrade to FortiOS version 7.0.11 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42469 is a vulnerability in FortiGate version 7.2.3 and below, version 7.0.9 and below Policy-based NGFW Mode that may allow an authenticated SSL-VPN user to bypass the policy via bookmarks in the web portal.
CVE-2022-42469 has a severity of medium, with a CVSS score of 4.3.
CVE-2022-42469 affects FortiGate version 7.2.3 and below, version 7.0.9 and below Policy-based NGFW Mode.
An authenticated SSL-VPN user can exploit CVE-2022-42469 by bypassing the policy via bookmarks in the web portal.
Yes, Fortinet has released a fix for CVE-2022-42469. It is recommended to update to FortiGate version 7.2.4 or version 7.0.11 or later.