First published: Mon Dec 12 2022(Updated: )
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | ||
FortiOS | >=5.0.0<=5.0.14 | |
FortiOS | >=5.2.0<=5.2.15 | |
FortiOS | >=5.4.0<=5.4.13 | |
FortiOS | >=5.6.0<=5.6.14 | |
FortiOS | >=6.0.0<=6.0.15 | |
FortiOS | >=6.2.0<=6.2.11 | |
FortiOS | >=6.4.0<=6.4.10 | |
FortiOS | >=7.0.0<=7.0.8 | |
FortiOS | >=7.2.0<=7.2.2 | |
Fortinet FortiProxy SSL VPN webmode | >=1.0.0<=1.0.7 | |
Fortinet FortiProxy SSL VPN webmode | >=1.1.0<=1.1.6 | |
Fortinet FortiProxy SSL VPN webmode | >=1.2.0<=1.2.13 | |
Fortinet FortiProxy SSL VPN webmode | >=2.0.0<=2.0.11 | |
Fortinet FortiProxy SSL VPN webmode | >=7.0.0<=7.0.7 | |
Fortinet FortiProxy SSL VPN webmode | =7.2.0 | |
FortiOS | >=6.0.0<=6.0.14 | |
FortiOS | >=6.4.0<=6.4.9 | |
FortiOS | >=7.0.0<=7.0.7 | |
Fortinet FIM-7901E | ||
Fortinet FIM-7904E | ||
Fortinet FIM-7910E | ||
Fortinet FIM-7920E | ||
Fortinet FIM-7921F | ||
Fortinet FIM-7941F | ||
Fortinet FortiGate 6300F | ||
Fortinet Fortigate 6300f | ||
Fortinet FortiGate 6500F | ||
Fortinet FortiGate 6500F DC | ||
Fortinet FortiGate-6501F | ||
Fortinet FortiGate-6501F | ||
Fortinet Fortigate-6601f-dc | ||
Fortinet Fortigate 6601F | ||
Fortinet Fortigate-7030e | ||
Fortinet FortiGate 7040E | ||
Fortinet Fortigate 7060e | ||
Fortinet Fortigate 7121F | ||
Fortinet FortiManager 7620E | ||
Fortinet Fpm-7620f | ||
Fortinet FPM-7630E | ||
FortiOS | >=6.0.0<6.0.16 | |
FortiOS | >=6.2.0<6.2.12 | |
FortiOS | >=6.4.0<6.4.11 | |
FortiOS | >=7.0.0<7.0.9 | |
FortiOS | >=7.2.0<7.2.3 | |
Fortinet FortiProxy SSL VPN webmode | >=2.0.0<2.0.12 | |
Fortinet FortiProxy SSL VPN webmode | >=7.0.0<7.0.8 | |
Fortinet FortiProxy SSL VPN webmode | >=7.2.0<7.2.2 | |
All of | ||
Any of | ||
FortiOS | >=6.0.0<6.0.15 | |
FortiOS | >=6.2.0<6.2.12 | |
FortiOS | >=6.4.0<6.4.10 | |
FortiOS | >=7.0.0<7.0.8 | |
Any of | ||
Fortinet FIM-7901E | ||
Fortinet FIM-7904E | ||
Fortinet FIM-7910E | ||
Fortinet FIM-7920E | ||
Fortinet FIM-7921F | ||
Fortinet FIM-7941F | ||
Fortinet FortiGate 6300F | ||
Fortinet Fortigate 6300f | ||
Fortinet FortiGate 6500F | ||
Fortinet FortiGate 6500F DC | ||
Fortinet FortiGate-6501F | ||
Fortinet FortiGate-6501F | ||
Fortinet Fortigate-6601f-dc | ||
Fortinet Fortigate 6601F | ||
Fortinet Fortigate-7030e | ||
Fortinet FortiGate 7040E | ||
Fortinet Fortigate 7060e | ||
Fortinet Fortigate 7121F | ||
Fortinet FortiManager 7620E | ||
Fortinet Fpm-7620f | ||
Fortinet FPM-7630E |
Please upgrade to FortiOS version 7.2.3 or above Please upgrade to FortiOS version 7.0.9 or above Please upgrade to FortiOS version 6.4.11 or above Please upgrade to FortiOS version 6.2.12 or above Please upgrade to FortiOS version 6.0.16 or above Please upgrade to upcoming FortiOS-6K7K version 7.0.8 or above Please upgrade to FortiOS-6K7K version 6.4.10 or above Please upgrade to FortiOS-6K7K version 6.2.12 or above Please upgrade to FortiOS-6K7K version 6.0.15 or above Please upgrade to FortiProxy version 7.2.2 or above Please upgrade to FortiProxy version 7.0.8 or above Please upgrade to upcoming FortiProxy version 2.0.12 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42475 is a vulnerability in Fortinet FortiOS SSL-VPN that allows an attacker to execute arbitrary code or commands remotely.
An attacker can exploit CVE-2022-42475 by sending specifically crafted requests to the Fortinet FortiOS SSL-VPN.
CVE-2022-42475 has a severity rating of high.
To fix CVE-2022-42475, update Fortinet FortiOS SSL-VPN to the latest version provided by Fortinet.
Yes, you can find more information about CVE-2022-42475 at the Fortinet PSIRT Advisory FG-IR-22-398.