Security News > 2022 > October > Auth bypass bug in FortiOS, FortiProxy is exploited in the wild (CVE-2022-40684)
CVE-2022-40684 is an authentication bypass vulnerability on vulnerable devices' administrative interface that can be triggered by sending a specially crafted HTTP(S) requests.
Successful exploitation may allow attackers with access to the management interface to perform administrator operations and to, essentially, take control of the device.
FortiOS version 7.2.2 or above, or version 7.0.7 or above.
FortiProxy version 7.2.1 or above, or 7.0.7 or above.
FortiSwitchManager version 7.2.1 or above.
If that's not possible, depending on the device, you should disable the HTTP/HTTPS administrative interface or limit IP addresses that can reach the administrative interface.
News URL
https://www.helpnetsecurity.com/2022/10/11/cve-2022-40684-exploited/
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-10-18 | CVE-2022-40684 | Improper Authentication vulnerability in Fortinet Fortios, Fortiproxy and Fortiswitchmanager An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests. | 9.8 |