First published: Tue Apr 11 2023(Updated: )
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb version 7.0.0 through 7.0.3, FortiADC version 7.1.0 through 7.1.1, FortiADC version 7.0.0 through 7.0.3, FortiADC 6.2 all versions, FortiADC 6.1 all versions, FortiADC 6.0 all versions, FortiADC 5.4 all versions, FortiADC 5.3 all versions, FortiADC 5.2 all versions, FortiADC 5.1 all versions allows attacker to execute unauthorized code or commands via specifically crafted arguments to existing commands.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiADC | >=5.1.0<6.2.6 | |
Fortinet FortiADC | >=7.0.0<7.0.4 | |
Fortinet FortiADC | >=7.1.0<7.1.2 | |
Fortinet FortiWeb | >=7.0.0<7.0.4 |
Please upgrade to FortiWeb version 7.2.0 or above Please upgrade to FortiWeb version 7.0.4 or above Please upgrade to FortiADC version 7.2.0 or above Please upgrade to FortiADC version 7.1.2 or above Please upgrade to FortiADC version 7.0.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43948 is a vulnerability that allows for OS command injection in Fortinet FortiWeb and FortiADC products.
Fortinet FortiWeb version 7.0.0 through 7.0.3 are affected by CVE-2022-43948.
Fortinet FortiADC version 7.0.0 through 7.0.3, version 7.1.0 through 7.1.1, and all versions of 6.2, 6.1, and 6.0 are affected by CVE-2022-43948.
CVE-2022-43948 has a severity rating of 7.8 (high).
To fix CVE-2022-43948, it is recommended to update to a patched version of the affected Fortinet FortiWeb or FortiADC product.