Security News > 2022 > December > Fortinet Warns of Active Exploitation of New SSL-VPN Pre-auth RCE Vulnerability

Fortinet Warns of Active Exploitation of New SSL-VPN Pre-auth RCE Vulnerability
2022-12-13 03:34

Fortinet on Monday issued emergency patches for a severe security flaw affecting its FortiOS SSL-VPN product that it said is being actively exploited in the wild.

Tracked as CVE-2022-42475, the critical bug relates to a heap-based buffer overflow vulnerability that could allow an unauthenticated attacker to execute arbitrary code via specially crafted requests.

The company said it's "Aware of an instance where this vulnerability was exploited in the wild," urging customers to move quickly to apply the updates.

Patches are available in FortiOS versions 7.2.3, 7.0.9, 6.4.11, and 6.2.12 as well as FortiOS-6K7K versions 7.0.8, 6.4.10, 6.2.12, and 6.0.15.

The American network security company has also published indicators of compromise associated with the exploitation attempts, including the IP addresses and the artifacts that are present in the file system post a successful attack.

The advisory comes two months after Fortinet warned of active weaponization of another critical authentication bypass bug in FortiOS, FortiProxy, and FortiSwitchManager.


News URL

https://thehackernews.com/2022/12/fortinet-warns-of-active-exploitation.html

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2023-01-02 CVE-2022-42475 Out-of-bounds Write vulnerability in Fortinet Fortios
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
network
low complexity
fortinet CWE-787
critical
9.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Fortinet 164 56 387 164 77 684