First published: Tue Nov 01 2022(Updated: )
An insufficient verification of data authenticity vulnerability [CWE-345] in FortiClient, FortiMail and FortiOS AV engines may allow an attacker to bypass the AV engine via manipulating MIME attachment with junk and pad characters in base64.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Virtual Private Network | ||
Fortinet Fortimail-200d | ||
Fortinet FortiOS IPS Engine |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-22-074 is classified as critical due to the potential for attackers to bypass the AV engine.
To fix FG-IR-22-074, ensure your FortiClient, FortiMail, and FortiOS products are updated to the latest version provided by Fortinet.
FG-IR-22-074 affects FortiClient, FortiMail, and FortiOS AV engines.
FG-IR-22-074 is an insufficient verification of data authenticity vulnerability, specifically categorized under CWE-345.
Yes, FG-IR-22-074 can potentially be exploited remotely by attackers manipulating MIME attachments.