Vulnerabilites related to fortinet - fortinac-f
var-202304-0865
Vulnerability from variot
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.11 and below, 8.7.6 and below may allow an unauthenticated attacker to access sensitive information via crafted HTTP requests. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202304-0865", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "fortinac", scope: "lt", trust: 1, vendor: "fortinet", version: "9.4.2", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "9.4.0", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "8.7.0", }, { model: "fortinac", scope: "lte", trust: 1, vendor: "fortinet", version: "9.2.7", }, { model: "fortinac-f", scope: "lt", trust: 1, vendor: "fortinet", version: "7.2.0", }, ], sources: [ { db: "NVD", id: "CVE-2022-43951", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:fortinet:fortinac-f:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.4.2", versionStartIncluding: "9.4.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "9.2.7", versionStartIncluding: "8.7.0", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2022-43951", }, ], }, cve: "CVE-2022-43951", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, id: "CVE-2022-43951", impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, ], severity: [ { author: "NVD", id: "CVE-2022-43951", trust: 1, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-202304-761", trust: 0.6, value: "HIGH", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2022-43951", }, { db: "CNNVD", id: "CNNVD-202304-761", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.11 and below, 8.7.6 and below may allow an unauthenticated attacker to access sensitive information via crafted HTTP requests. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection", sources: [ { db: "NVD", id: "CVE-2022-43951", }, { db: "CNNVD", id: "CNNVD-202304-761", }, ], trust: 1.44, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-43951", trust: 1.6, }, { db: "CNNVD", id: "CNNVD-202304-761", trust: 0.6, }, ], sources: [ { db: "NVD", id: "CVE-2022-43951", }, { db: "CNNVD", id: "CNNVD-202304-761", }, ], }, id: "VAR-202304-0865", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.1625, }, last_update_date: "2023-04-22T22:48:30.984000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "FortiNAC Security vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=234182", }, ], sources: [ { db: "CNNVD", id: "CNNVD-202304-761", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-noinfo", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2022-43951", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.6, url: "https://fortiguard.com/psirt/fg-ir-22-409", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-43951/", }, ], sources: [ { db: "NVD", id: "CVE-2022-43951", }, { db: "CNNVD", id: "CNNVD-202304-761", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "NVD", id: "CVE-2022-43951", }, { db: "CNNVD", id: "CNNVD-202304-761", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-04-11T17:15:00", db: "NVD", id: "CVE-2022-43951", }, { date: "2023-04-11T00:00:00", db: "CNNVD", id: "CNNVD-202304-761", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-04-18T19:27:00", db: "NVD", id: "CVE-2022-43951", }, { date: "2023-04-19T00:00:00", db: "CNNVD", id: "CNNVD-202304-761", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202304-761", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "FortiNAC Security hole", sources: [ { db: "CNNVD", id: "CNNVD-202304-761", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202304-761", }, ], trust: 0.6, }, }
var-202305-0038
Vulnerability from variot
An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in License Management would permit an authenticated attacker to trigger remote code execution via crafted licenses. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection. Fortinet FortiNAC 7.2.0, FortiNAC 9.4.2 and earlier, 9.2, 9.1, 8.8, and 8.7 have security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202305-0038", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "fortinac", scope: "lt", trust: 1, vendor: "fortinet", version: "9.4.3", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "8.7.0", }, { model: "fortinac-f", scope: "eq", trust: 1, vendor: "fortinet", version: "7.2.0", }, ], sources: [ { db: "NVD", id: "CVE-2023-22637", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.4.3", versionStartIncluding: "8.7.0", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2023-22637", }, ], }, cve: "CVE-2023-22637", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 2.3, id: "CVE-2023-22637", impactScore: 6, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", trust: 1, userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, ], severity: [ { author: "NVD", id: "CVE-2023-22637", trust: 1, value: "CRITICAL", }, { author: "CNNVD", id: "CNNVD-202305-193", trust: 0.6, value: "CRITICAL", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2023-22637", }, { db: "CNNVD", id: "CNNVD-202305-193", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in License Management would permit an authenticated attacker to trigger remote code execution via crafted licenses. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection. \nFortinet FortiNAC 7.2.0, FortiNAC 9.4.2 and earlier, 9.2, 9.1, 8.8, and 8.7 have security vulnerabilities", sources: [ { db: "NVD", id: "CVE-2023-22637", }, { db: "CNNVD", id: "CNNVD-202305-193", }, { db: "VULMON", id: "CVE-2023-22637", }, ], trust: 1.53, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2023-22637", trust: 1.7, }, { db: "AUSCERT", id: "ESB-2023.2498", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202305-193", trust: 0.6, }, { db: "VULMON", id: "CVE-2023-22637", trust: 0.1, }, ], sources: [ { db: "VULMON", id: "CVE-2023-22637", }, { db: "NVD", id: "CVE-2023-22637", }, { db: "CNNVD", id: "CNNVD-202305-193", }, ], }, id: "VAR-202305-0038", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.1625, }, last_update_date: "2023-05-10T22:02:45.820000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Fortinet FortiNAC Fixes for cross-site scripting vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=236785", }, ], sources: [ { db: "CNNVD", id: "CNNVD-202305-193", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-79", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2023-22637", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "https://fortiguard.com/psirt/fg-ir-23-013", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2023-22637/", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2023-22637", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2023.2498", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULMON", id: "CVE-2023-22637", }, { db: "NVD", id: "CVE-2023-22637", }, { db: "CNNVD", id: "CNNVD-202305-193", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULMON", id: "CVE-2023-22637", }, { db: "NVD", id: "CVE-2023-22637", }, { db: "CNNVD", id: "CNNVD-202305-193", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-05-03T00:00:00", db: "VULMON", id: "CVE-2023-22637", }, { date: "2023-05-03T22:15:00", db: "NVD", id: "CVE-2023-22637", }, { date: "2023-05-03T00:00:00", db: "CNNVD", id: "CNNVD-202305-193", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-05-04T00:00:00", db: "VULMON", id: "CVE-2023-22637", }, { date: "2023-05-09T20:45:00", db: "NVD", id: "CVE-2023-22637", }, { date: "2023-05-10T00:00:00", db: "CNNVD", id: "CNNVD-202305-193", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202305-193", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Fortinet FortiNAC Cross-site scripting vulnerability", sources: [ { db: "CNNVD", id: "CNNVD-202305-193", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "XSS", sources: [ { db: "CNNVD", id: "CNNVD-202305-193", }, ], trust: 0.6, }, }
var-202305-0133
Vulnerability from variot
An insufficiently protected credentials vulnerability [CWE-522] in FortiNAC-F 7.2.0, FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.0 all versions, 8.7.0 all versions may allow a local attacker with system access to retrieve users' passwords. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection. Fortinet FortiNAC has a security flaw that stems from insufficiently protected credentials
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202305-0133", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "9.4.0", }, { model: "fortinac", scope: "lte", trust: 1, vendor: "fortinet", version: "9.1.8", }, { model: "fortinac", scope: "lt", trust: 1, vendor: "fortinet", version: "9.2.7", }, { model: "fortinac", scope: "lt", trust: 1, vendor: "fortinet", version: "9.4.2", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "8.7.0", }, { model: "fortinac-f", scope: "eq", trust: 1, vendor: "fortinet", version: "7.2.0", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "9.2.0", }, ], sources: [ { db: "NVD", id: "CVE-2022-45859", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.4.2", versionStartIncluding: "9.4.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.2.7", versionStartIncluding: "9.2.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "9.1.8", versionStartIncluding: "8.7.0", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2022-45859", }, ], }, cve: "CVE-2022-45859", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "NONE", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 0.8, id: "CVE-2022-45859", impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, ], severity: [ { author: "NVD", id: "CVE-2022-45859", trust: 1, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202305-191", trust: 0.6, value: "MEDIUM", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2022-45859", }, { db: "CNNVD", id: "CNNVD-202305-191", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "An insufficiently protected credentials vulnerability [CWE-522] in FortiNAC-F 7.2.0, FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.0 all versions, 8.7.0 all versions may allow a local attacker with system access to retrieve users' passwords. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection. \nFortinet FortiNAC has a security flaw that stems from insufficiently protected credentials", sources: [ { db: "NVD", id: "CVE-2022-45859", }, { db: "CNNVD", id: "CNNVD-202305-191", }, { db: "VULMON", id: "CVE-2022-45859", }, ], trust: 1.53, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-45859", trust: 1.7, }, { db: "CNNVD", id: "CNNVD-202305-191", trust: 0.6, }, { db: "VULMON", id: "CVE-2022-45859", trust: 0.1, }, ], sources: [ { db: "VULMON", id: "CVE-2022-45859", }, { db: "NVD", id: "CVE-2022-45859", }, { db: "CNNVD", id: "CNNVD-202305-191", }, ], }, id: "VAR-202305-0133", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.1625, }, last_update_date: "2023-05-12T22:52:07.188000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Fortinet FortiNAC Security vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=235765", }, ], sources: [ { db: "CNNVD", id: "CNNVD-202305-191", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-522", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2022-45859", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "https://fortiguard.com/psirt/fg-ir-22-456", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-45859/", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULMON", id: "CVE-2022-45859", }, { db: "NVD", id: "CVE-2022-45859", }, { db: "CNNVD", id: "CNNVD-202305-191", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULMON", id: "CVE-2022-45859", }, { db: "NVD", id: "CVE-2022-45859", }, { db: "CNNVD", id: "CNNVD-202305-191", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-05-03T00:00:00", db: "VULMON", id: "CVE-2022-45859", }, { date: "2023-05-03T22:15:00", db: "NVD", id: "CVE-2022-45859", }, { date: "2023-05-03T00:00:00", db: "CNNVD", id: "CNNVD-202305-191", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-05-04T00:00:00", db: "VULMON", id: "CVE-2022-45859", }, { date: "2023-05-11T17:48:00", db: "NVD", id: "CVE-2022-45859", }, { date: "2023-05-12T00:00:00", db: "CNNVD", id: "CNNVD-202305-191", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-202305-191", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Fortinet FortiNAC Security hole", sources: [ { db: "CNNVD", id: "CNNVD-202305-191", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202305-191", }, ], trust: 0.6, }, }
var-202305-0225
Vulnerability from variot
A use of hard-coded credentials vulnerability [CWE-798] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions may allow an authenticated attacker to access to the database via shell commands. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202305-0225", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "8.7.0", }, { model: "fortinac", scope: "lte", trust: 1, vendor: "fortinet", version: "9.2.7", }, { model: "fortinac", scope: "lt", trust: 1, vendor: "fortinet", version: "9.4.3", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "9.4.0", }, { model: "fortinac-f", scope: "eq", trust: 1, vendor: "fortinet", version: "7.2.0", }, ], sources: [ { db: "NVD", id: "CVE-2023-26203", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "9.2.7", versionStartIncluding: "8.7.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.4.3", versionStartIncluding: "9.4.0", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2023-26203", }, ], }, cve: "CVE-2023-26203", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, id: "CVE-2023-26203", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, ], severity: [ { author: "NVD", id: "CVE-2023-26203", trust: 1, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-202305-194", trust: 0.6, value: "HIGH", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2023-26203", }, { db: "CNNVD", id: "CNNVD-202305-194", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A use of hard-coded credentials vulnerability [CWE-798] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions may allow an authenticated attacker to access to the database via shell commands. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection", sources: [ { db: "NVD", id: "CVE-2023-26203", }, { db: "CNNVD", id: "CNNVD-202305-194", }, { db: "VULMON", id: "CVE-2023-26203", }, ], trust: 1.53, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2023-26203", trust: 1.7, }, { db: "CNNVD", id: "CNNVD-202305-194", trust: 0.6, }, { db: "VULMON", id: "CVE-2023-26203", trust: 0.1, }, ], sources: [ { db: "VULMON", id: "CVE-2023-26203", }, { db: "NVD", id: "CVE-2023-26203", }, { db: "CNNVD", id: "CNNVD-202305-194", }, ], }, id: "VAR-202305-0225", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.1625, }, last_update_date: "2023-05-11T22:51:38.714000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Fortinet FortiNAC Repair measures for trust management problem vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=236981", }, ], sources: [ { db: "CNNVD", id: "CNNVD-202305-194", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-798", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2023-26203", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "https://fortiguard.com/psirt/fg-ir-22-520", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2023-26203/", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULMON", id: "CVE-2023-26203", }, { db: "NVD", id: "CVE-2023-26203", }, { db: "CNNVD", id: "CNNVD-202305-194", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULMON", id: "CVE-2023-26203", }, { db: "NVD", id: "CVE-2023-26203", }, { db: "CNNVD", id: "CNNVD-202305-194", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-05-03T00:00:00", db: "VULMON", id: "CVE-2023-26203", }, { date: "2023-05-03T22:15:00", db: "NVD", id: "CVE-2023-26203", }, { date: "2023-05-03T00:00:00", db: "CNNVD", id: "CNNVD-202305-194", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-05-04T00:00:00", db: "VULMON", id: "CVE-2023-26203", }, { date: "2023-05-10T20:44:00", db: "NVD", id: "CVE-2023-26203", }, { date: "2023-05-11T00:00:00", db: "CNNVD", id: "CNNVD-202305-194", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-202305-194", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Fortinet FortiNAC Trust Management Issue Vulnerability", sources: [ { db: "CNNVD", id: "CNNVD-202305-194", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "trust management problem", sources: [ { db: "CNNVD", id: "CNNVD-202305-194", }, ], trust: 0.6, }, }
var-202305-0039
Vulnerability from variot
A URL redirection to untrusted site ('Open Redirect') vulnerability [CWE-601] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.1 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions may allow an unauthenticated attacker to redirect users to any arbitrary website via a crafted URL. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection. Fortinet FortiNAC has a security vulnerability due to an open redirection vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202305-0039", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "8.7.0", }, { model: "fortinac", scope: "lt", trust: 1, vendor: "fortinet", version: "9.4.2", }, { model: "fortinac-f", scope: "eq", trust: 1, vendor: "fortinet", version: "7.2.0", }, ], sources: [ { db: "NVD", id: "CVE-2022-43950", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.4.2", versionStartIncluding: "8.7.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2022-43950", }, ], }, cve: "CVE-2022-43950", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "NONE", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 2.8, id: "CVE-2022-43950", impactScore: 1.4, integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", trust: 1, userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", version: "3.1", }, ], severity: [ { author: "NVD", id: "CVE-2022-43950", trust: 1, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202305-190", trust: 0.6, value: "MEDIUM", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2022-43950", }, { db: "CNNVD", id: "CNNVD-202305-190", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A URL redirection to untrusted site ('Open Redirect') vulnerability [CWE-601] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.1 and below, 9.2 all versions, 9.1 all versions, \r\n 8.8 all versions, 8.7 all versions may allow an unauthenticated attacker to redirect users to any arbitrary website via a crafted URL. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection. \nFortinet FortiNAC has a security vulnerability due to an open redirection vulnerability", sources: [ { db: "NVD", id: "CVE-2022-43950", }, { db: "CNNVD", id: "CNNVD-202305-190", }, { db: "VULMON", id: "CVE-2022-43950", }, ], trust: 1.53, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-43950", trust: 1.7, }, { db: "CNNVD", id: "CNNVD-202305-190", trust: 0.6, }, { db: "VULMON", id: "CVE-2022-43950", trust: 0.1, }, ], sources: [ { db: "VULMON", id: "CVE-2022-43950", }, { db: "NVD", id: "CVE-2022-43950", }, { db: "CNNVD", id: "CNNVD-202305-190", }, ], }, id: "VAR-202305-0039", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.1625, }, last_update_date: "2023-05-12T22:56:32.886000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Fortinet FortiNAC Enter the fix for the verification error vulnerability", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=237180", }, ], sources: [ { db: "CNNVD", id: "CNNVD-202305-190", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-601", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2022-43950", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "https://fortiguard.com/psirt/fg-ir-22-407", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-43950/", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULMON", id: "CVE-2022-43950", }, { db: "NVD", id: "CVE-2022-43950", }, { db: "CNNVD", id: "CNNVD-202305-190", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULMON", id: "CVE-2022-43950", }, { db: "NVD", id: "CVE-2022-43950", }, { db: "CNNVD", id: "CNNVD-202305-190", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-05-03T00:00:00", db: "VULMON", id: "CVE-2022-43950", }, { date: "2023-05-03T22:15:00", db: "NVD", id: "CVE-2022-43950", }, { date: "2023-05-03T00:00:00", db: "CNNVD", id: "CNNVD-202305-190", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-05-04T00:00:00", db: "VULMON", id: "CVE-2022-43950", }, { date: "2023-05-11T17:51:00", db: "NVD", id: "CVE-2022-43950", }, { date: "2023-05-12T00:00:00", db: "CNNVD", id: "CNNVD-202305-190", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202305-190", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Fortinet FortiNAC Input validation error vulnerability", sources: [ { db: "CNNVD", id: "CNNVD-202305-190", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "input validation error", sources: [ { db: "CNNVD", id: "CNNVD-202305-190", }, ], trust: 0.6, }, }
var-202302-1269
Vulnerability from variot
An improper authorization vulnerability [CWE-285] in Fortinet FortiNAC version 9.4.0 through 9.4.1 and before 9.2.6 allows an unauthenticated user to perform some administrative operations over the FortiNAC instance via crafted HTTP POST requests. fortinet's FortiNAC and FortiNAC-F Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-1269", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "fortinac", scope: "lt", trust: 1, vendor: "fortinet", version: "9.2.7", }, { model: "fortinac", scope: "lt", trust: 1, vendor: "fortinet", version: "9.4.2", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "9.2.0", }, { model: "fortinac-f", scope: "lt", trust: 1, vendor: "fortinet", version: "7.2.0", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "9.4.0", }, { model: "fortinac", scope: "eq", trust: 0.8, vendor: "フォーティネット", version: "-f 7.2.0", }, { model: "fortinac", scope: "eq", trust: 0.8, vendor: "フォーティネット", version: "9.2.0 that's all 9.2.7", }, { model: "fortinac", scope: "eq", trust: 0.8, vendor: "フォーティネット", version: "9.4.0 that's all 9.4.2", }, { model: "fortinac-f", scope: "eq", trust: 0.8, vendor: "フォーティネット", version: "7.2.0", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-004465", }, { db: "NVD", id: "CVE-2022-38375", }, ], }, cve: "CVE-2022-38375", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, id: "CVE-2022-38375", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "LOW", attackVector: "NETWORK", author: "psirt@fortinet.com", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "NONE", exploitabilityScore: 3.9, id: "CVE-2022-38375", impactScore: 5.2, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 9.8, baseSeverity: "Critical", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2022-38375", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2022-38375", trust: 1, value: "CRITICAL", }, { author: "psirt@fortinet.com", id: "CVE-2022-38375", trust: 1, value: "CRITICAL", }, { author: "NVD", id: "CVE-2022-38375", trust: 0.8, value: "Critical", }, { author: "CNNVD", id: "CNNVD-202302-1440", trust: 0.6, value: "CRITICAL", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-004465", }, { db: "CNNVD", id: "CNNVD-202302-1440", }, { db: "NVD", id: "CVE-2022-38375", }, { db: "NVD", id: "CVE-2022-38375", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "An improper authorization vulnerability [CWE-285] in Fortinet FortiNAC version 9.4.0 through 9.4.1 and before 9.2.6 allows an unauthenticated user to perform some administrative operations over the FortiNAC instance via crafted HTTP POST requests. fortinet's FortiNAC and FortiNAC-F Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", sources: [ { db: "NVD", id: "CVE-2022-38375", }, { db: "JVNDB", id: "JVNDB-2023-004465", }, { db: "VULHUB", id: "VHN-434169", }, { db: "VULMON", id: "CVE-2022-38375", }, ], trust: 1.8, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-38375", trust: 3.4, }, { db: "JVNDB", id: "JVNDB-2023-004465", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202302-1440", trust: 0.6, }, { db: "VULHUB", id: "VHN-434169", trust: 0.1, }, { db: "VULMON", id: "CVE-2022-38375", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-434169", }, { db: "VULMON", id: "CVE-2022-38375", }, { db: "JVNDB", id: "JVNDB-2023-004465", }, { db: "CNNVD", id: "CNNVD-202302-1440", }, { db: "NVD", id: "CVE-2022-38375", }, ], }, id: "VAR-202302-1269", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-434169", }, ], trust: 0.01, }, last_update_date: "2024-08-14T14:30:44.572000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "FG-IR-22-329", trust: 0.8, url: "https://fortiguard.com/psirt/FG-IR-22-329", }, { title: "Fortinet FortiNAC Security vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=226809", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-004465", }, { db: "CNNVD", id: "CNNVD-202302-1440", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-285", trust: 1, }, { problemtype: "NVD-CWE-Other", trust: 1, }, { problemtype: "others (CWE-Other) [NVD evaluation ]", trust: 0.8, }, { problemtype: "CWE-863", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-434169", }, { db: "JVNDB", id: "JVNDB-2023-004465", }, { db: "NVD", id: "CVE-2022-38375", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://fortiguard.com/psirt/fg-ir-22-329", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2022-38375", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-38375/", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULHUB", id: "VHN-434169", }, { db: "VULMON", id: "CVE-2022-38375", }, { db: "JVNDB", id: "JVNDB-2023-004465", }, { db: "CNNVD", id: "CNNVD-202302-1440", }, { db: "NVD", id: "CVE-2022-38375", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-434169", }, { db: "VULMON", id: "CVE-2022-38375", }, { db: "JVNDB", id: "JVNDB-2023-004465", }, { db: "CNNVD", id: "CNNVD-202302-1440", }, { db: "NVD", id: "CVE-2022-38375", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-02-16T00:00:00", db: "VULHUB", id: "VHN-434169", }, { date: "2023-02-16T00:00:00", db: "VULMON", id: "CVE-2022-38375", }, { date: "2023-10-30T00:00:00", db: "JVNDB", id: "JVNDB-2023-004465", }, { date: "2023-02-16T00:00:00", db: "CNNVD", id: "CNNVD-202302-1440", }, { date: "2023-02-16T19:15:12.797000", db: "NVD", id: "CVE-2022-38375", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-02-24T00:00:00", db: "VULHUB", id: "VHN-434169", }, { date: "2023-02-16T00:00:00", db: "VULMON", id: "CVE-2022-38375", }, { date: "2023-10-30T07:28:00", db: "JVNDB", id: "JVNDB-2023-004465", }, { date: "2023-02-27T00:00:00", db: "CNNVD", id: "CNNVD-202302-1440", }, { date: "2023-11-07T03:50:06.460000", db: "NVD", id: "CVE-2022-38375", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202302-1440", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "fortinet's FortiNAC and FortiNAC-F Vulnerability in", sources: [ { db: "JVNDB", id: "JVNDB-2023-004465", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202302-1440", }, ], trust: 0.6, }, }
var-202306-1039
Vulnerability from variot
An improper permissions, privileges, and access controls vulnerability [CWE-264] in FortiNAC-F 7.2.0, FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.0 all versions 8.7.0 all versions may allow an unauthenticated attacker to perform a DoS attack on the device via client-secure renegotiation. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection. Fortinet FortiNAC has a security flaw that stems from improper permissions, privileges, and access control flaws
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202306-1039", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "8.7.0", }, { model: "fortinac", scope: "eq", trust: 1, vendor: "fortinet", version: "9.4.1", }, { model: "fortinac", scope: "lte", trust: 1, vendor: "fortinet", version: "9.1.8", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "9.2.0", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "8.8.0", }, { model: "fortinac", scope: "lte", trust: 1, vendor: "fortinet", version: "8.7.6", }, { model: "fortinac", scope: "lte", trust: 1, vendor: "fortinet", version: "9.2.6", }, { model: "fortinac", scope: "lte", trust: 1, vendor: "fortinet", version: "8.8.11", }, { model: "fortinac", scope: "eq", trust: 1, vendor: "fortinet", version: "9.4.0", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "9.1.0", }, { model: "fortinac-f", scope: "eq", trust: 1, vendor: "fortinet", version: "7.2.0", }, ], sources: [ { db: "NVD", id: "CVE-2023-22633", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "8.8.11", versionStartIncluding: "8.8.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "8.7.6", versionStartIncluding: "8.7.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:9.4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:9.4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "9.1.8", versionStartIncluding: "9.1.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "9.2.6", versionStartIncluding: "9.2.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2023-22633", }, ], }, cve: "CVE-2023-22633", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", exploitabilityScore: 3.9, id: "CVE-2023-22633", impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, ], severity: [ { author: "NVD", id: "CVE-2023-22633", trust: 1, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-202306-889", trust: 0.6, value: "HIGH", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2023-22633", }, { db: "CNNVD", id: "CNNVD-202306-889", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "An improper permissions, privileges, and access controls vulnerability [CWE-264] in FortiNAC-F 7.2.0, FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.0 all versions 8.7.0 all versions may allow an unauthenticated attacker to perform a DoS attack on the device via client-secure renegotiation. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection. \nFortinet FortiNAC has a security flaw that stems from improper permissions, privileges, and access control flaws", sources: [ { db: "NVD", id: "CVE-2023-22633", }, { db: "CNNVD", id: "CNNVD-202306-889", }, ], trust: 1.44, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2023-22633", trust: 1.6, }, { db: "CNNVD", id: "CNNVD-202306-889", trust: 0.6, }, ], sources: [ { db: "NVD", id: "CVE-2023-22633", }, { db: "CNNVD", id: "CNNVD-202306-889", }, ], }, id: "VAR-202306-1039", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.1625, }, last_update_date: "2023-06-19T22:49:05.461000Z", problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-Other", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2023-22633", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.6, url: "https://fortiguard.com/psirt/fg-ir-22-521", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2023-22633/", }, ], sources: [ { db: "NVD", id: "CVE-2023-22633", }, { db: "CNNVD", id: "CNNVD-202306-889", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "NVD", id: "CVE-2023-22633", }, { db: "CNNVD", id: "CNNVD-202306-889", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-06-13T09:15:00", db: "NVD", id: "CVE-2023-22633", }, { date: "2023-06-13T00:00:00", db: "CNNVD", id: "CNNVD-202306-889", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-06-17T01:40:00", db: "NVD", id: "CVE-2023-22633", }, { date: "2023-06-19T00:00:00", db: "CNNVD", id: "CNNVD-202306-889", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202306-889", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Fortinet FortiNAC Security hole", sources: [ { db: "CNNVD", id: "CNNVD-202306-889", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202306-889", }, ], trust: 0.6, }, }
var-202302-1445
Vulnerability from variot
Some cryptographic issues in Fortinet FortiNAC versions 9.4.0 through 9.4.1, 9.2.0 through 9.2.7, 9.1.0 through 9.1.8, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an attacker to decrypt and forge protocol communication messages. fortinet's FortiNAC and FortiNAC-F Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-1445", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "fortinac", scope: "lt", trust: 1, vendor: "fortinet", version: "9.4.2", }, { model: "fortinac-f", scope: "lt", trust: 1, vendor: "fortinet", version: "7.2.0", }, { model: "fortinac", scope: "lte", trust: 1, vendor: "fortinet", version: "9.2.7", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "9.4.0", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "8.3.7", }, { model: "fortinac-f", scope: "eq", trust: 0.8, vendor: "フォーティネット", version: "7.2.0", }, { model: "fortinac", scope: "eq", trust: 0.8, vendor: "フォーティネット", version: "-f 7.2.0", }, { model: "fortinac", scope: "eq", trust: 0.8, vendor: "フォーティネット", version: "8.3.7 to 9.2.7", }, { model: "fortinac", scope: "eq", trust: 0.8, vendor: "フォーティネット", version: "9.4.0 that's all 9.4.2", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-004412", }, { db: "NVD", id: "CVE-2022-40675", }, ], }, cve: "CVE-2022-40675", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "HIGH", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 2.2, id: "CVE-2022-40675", impactScore: 5.2, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, { attackComplexity: "LOW", attackVector: "NETWORK", author: "psirt@fortinet.com", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", exploitabilityScore: 3.9, id: "CVE-2022-40675", impactScore: 2.5, integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, { attackComplexity: "High", attackVector: "Network", author: "NVD", availabilityImpact: "None", baseScore: 7.4, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2022-40675", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2022-40675", trust: 1, value: "HIGH", }, { author: "psirt@fortinet.com", id: "CVE-2022-40675", trust: 1, value: "MEDIUM", }, { author: "NVD", id: "CVE-2022-40675", trust: 0.8, value: "High", }, { author: "CNNVD", id: "CNNVD-202302-1433", trust: 0.6, value: "HIGH", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-004412", }, { db: "CNNVD", id: "CNNVD-202302-1433", }, { db: "NVD", id: "CVE-2022-40675", }, { db: "NVD", id: "CVE-2022-40675", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Some cryptographic issues in Fortinet FortiNAC versions 9.4.0 through 9.4.1, 9.2.0 through 9.2.7, 9.1.0 through 9.1.8, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an attacker to decrypt and forge protocol communication messages. fortinet's FortiNAC and FortiNAC-F Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with", sources: [ { db: "NVD", id: "CVE-2022-40675", }, { db: "JVNDB", id: "JVNDB-2023-004412", }, { db: "VULHUB", id: "VHN-436488", }, { db: "VULMON", id: "CVE-2022-40675", }, ], trust: 1.8, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-40675", trust: 3.4, }, { db: "JVNDB", id: "JVNDB-2023-004412", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202302-1433", trust: 0.6, }, { db: "VULHUB", id: "VHN-436488", trust: 0.1, }, { db: "VULMON", id: "CVE-2022-40675", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-436488", }, { db: "VULMON", id: "CVE-2022-40675", }, { db: "JVNDB", id: "JVNDB-2023-004412", }, { db: "CNNVD", id: "CNNVD-202302-1433", }, { db: "NVD", id: "CVE-2022-40675", }, ], }, id: "VAR-202302-1445", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-436488", }, ], trust: 0.01, }, last_update_date: "2024-08-14T15:32:14.414000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "FG-IR-22-312", trust: 0.8, url: "https://fortiguard.com/psirt/FG-IR-22-312", }, { title: "Fortinet FortiNAC Fixes for encryption problem vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=226803", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-004412", }, { db: "CNNVD", id: "CNNVD-202302-1433", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-310", trust: 1, }, { problemtype: "NVD-CWE-noinfo", trust: 1, }, { problemtype: "Lack of information (CWE-noinfo) [NVD evaluation ]", trust: 0.8, }, { problemtype: "CWE-327", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-436488", }, { db: "JVNDB", id: "JVNDB-2023-004412", }, { db: "NVD", id: "CVE-2022-40675", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://fortiguard.com/psirt/fg-ir-22-312", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2022-40675", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-40675/", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULHUB", id: "VHN-436488", }, { db: "VULMON", id: "CVE-2022-40675", }, { db: "JVNDB", id: "JVNDB-2023-004412", }, { db: "CNNVD", id: "CNNVD-202302-1433", }, { db: "NVD", id: "CVE-2022-40675", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-436488", }, { db: "VULMON", id: "CVE-2022-40675", }, { db: "JVNDB", id: "JVNDB-2023-004412", }, { db: "CNNVD", id: "CNNVD-202302-1433", }, { db: "NVD", id: "CVE-2022-40675", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-02-16T00:00:00", db: "VULHUB", id: "VHN-436488", }, { date: "2023-02-16T00:00:00", db: "VULMON", id: "CVE-2022-40675", }, { date: "2023-10-30T00:00:00", db: "JVNDB", id: "JVNDB-2023-004412", }, { date: "2023-02-16T00:00:00", db: "CNNVD", id: "CNNVD-202302-1433", }, { date: "2023-02-16T19:15:13.187000", db: "NVD", id: "CVE-2022-40675", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-02-24T00:00:00", db: "VULHUB", id: "VHN-436488", }, { date: "2023-02-16T00:00:00", db: "VULMON", id: "CVE-2022-40675", }, { date: "2023-10-30T05:48:00", db: "JVNDB", id: "JVNDB-2023-004412", }, { date: "2023-02-27T00:00:00", db: "CNNVD", id: "CNNVD-202302-1433", }, { date: "2023-11-07T03:52:34.577000", db: "NVD", id: "CVE-2022-40675", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202302-1433", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "fortinet's FortiNAC and FortiNAC-F Vulnerability in", sources: [ { db: "JVNDB", id: "JVNDB-2023-004412", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "encryption problem", sources: [ { db: "CNNVD", id: "CNNVD-202302-1433", }, ], trust: 0.6, }, }
var-202305-0103
Vulnerability from variot
A weak authentication vulnerability [CWE-1390] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in device registration page may allow an unauthenticated attacker to perform password spraying attacks with an increased chance of success. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection. Fortinet FortiNAC has a security flaw that stems from a weak authentication flaw in the device registration page
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202305-0103", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "9.4.0", }, { model: "fortinac", scope: "lte", trust: 1, vendor: "fortinet", version: "9.2.6", }, { model: "fortinac", scope: "lt", trust: 1, vendor: "fortinet", version: "9.4.2", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "8.7.0", }, { model: "fortinac-f", scope: "eq", trust: 1, vendor: "fortinet", version: "7.2.0", }, ], sources: [ { db: "NVD", id: "CVE-2022-45860", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.4.2", versionStartIncluding: "9.4.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "9.2.6", versionStartIncluding: "8.7.0", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2022-45860", }, ], }, cve: "CVE-2022-45860", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, id: "CVE-2022-45860", impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, ], severity: [ { author: "NVD", id: "CVE-2022-45860", trust: 1, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-202305-192", trust: 0.6, value: "HIGH", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2022-45860", }, { db: "CNNVD", id: "CNNVD-202305-192", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A weak authentication vulnerability [CWE-1390] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in device registration page may allow an unauthenticated attacker to perform password spraying attacks with an increased chance of success. Fortinet FortiNAC is a network access control solution developed by Fortinet. This product is mainly used for network access control and IoT security protection. \nFortinet FortiNAC has a security flaw that stems from a weak authentication flaw in the device registration page", sources: [ { db: "NVD", id: "CVE-2022-45860", }, { db: "CNNVD", id: "CNNVD-202305-192", }, { db: "VULMON", id: "CVE-2022-45860", }, ], trust: 1.53, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-45860", trust: 1.7, }, { db: "CNNVD", id: "CNNVD-202305-192", trust: 0.6, }, { db: "VULMON", id: "CVE-2022-45860", trust: 0.1, }, ], sources: [ { db: "VULMON", id: "CVE-2022-45860", }, { db: "NVD", id: "CVE-2022-45860", }, { db: "CNNVD", id: "CNNVD-202305-192", }, ], }, id: "VAR-202305-0103", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.1625, }, last_update_date: "2023-05-12T22:47:38.454000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Fortinet FortiNAC Remediation measures for authorization problem vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=237181", }, ], sources: [ { db: "CNNVD", id: "CNNVD-202305-192", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-287", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2022-45860", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "https://fortiguard.com/psirt/fg-ir-22-464", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-45860/", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULMON", id: "CVE-2022-45860", }, { db: "NVD", id: "CVE-2022-45860", }, { db: "CNNVD", id: "CNNVD-202305-192", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULMON", id: "CVE-2022-45860", }, { db: "NVD", id: "CVE-2022-45860", }, { db: "CNNVD", id: "CNNVD-202305-192", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-05-03T00:00:00", db: "VULMON", id: "CVE-2022-45860", }, { date: "2023-05-03T22:15:00", db: "NVD", id: "CVE-2022-45860", }, { date: "2023-05-03T00:00:00", db: "CNNVD", id: "CNNVD-202305-192", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-05-04T00:00:00", db: "VULMON", id: "CVE-2022-45860", }, { date: "2023-05-11T17:48:00", db: "NVD", id: "CVE-2022-45860", }, { date: "2023-05-12T00:00:00", db: "CNNVD", id: "CNNVD-202305-192", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202305-192", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Fortinet FortiNAC Authorization problem vulnerability", sources: [ { db: "CNNVD", id: "CNNVD-202305-192", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "authorization issue", sources: [ { db: "CNNVD", id: "CNNVD-202305-192", }, ], trust: 0.6, }, }
var-202302-1353
Vulnerability from variot
An improper restriction of xml external entity reference in Fortinet FortiNAC version 9.4.0 through 9.4.1, FortiNAC version 9.2.0 through 9.2.7, FortiNAC version 9.1.0 through 9.1.8, FortiNAC version 8.8.0 through 8.8.11, FortiNAC version 8.7.0 through 8.7.6, FortiNAC version 8.6.0 through 8.6.5, FortiNAC version 8.5.0 through 8.5.4, FortiNAC version 8.3.7 allows attacker to read arbitrary files or trigger a denial of service via specifically crafted XML documents. fortinet's FortiNAC and FortiNAC-F for, XML There is a vulnerability in an external entity.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-1353", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "fortinac", scope: "lt", trust: 1, vendor: "fortinet", version: "9.4.2", }, { model: "fortinac-f", scope: "lt", trust: 1, vendor: "fortinet", version: "7.2.0", }, { model: "fortinac", scope: "lte", trust: 1, vendor: "fortinet", version: "9.2.7", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "9.4.0", }, { model: "fortinac", scope: "gte", trust: 1, vendor: "fortinet", version: "8.3.7", }, { model: "fortinac", scope: null, trust: 0.8, vendor: "フォーティネット", version: null, }, { model: "fortinac-f", scope: null, trust: 0.8, vendor: "フォーティネット", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-019900", }, { db: "NVD", id: "CVE-2022-39954", }, ], }, cve: "CVE-2022-39954", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, id: "CVE-2022-39954", impactScore: 5.2, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, { attackComplexity: "LOW", attackVector: "NETWORK", author: "psirt@fortinet.com", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", exploitabilityScore: 3.9, id: "CVE-2022-39954", impactScore: 3.4, integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 9.1, baseSeverity: "Critical", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2022-39954", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2022-39954", trust: 1, value: "CRITICAL", }, { author: "psirt@fortinet.com", id: "CVE-2022-39954", trust: 1, value: "HIGH", }, { author: "NVD", id: "CVE-2022-39954", trust: 0.8, value: "Critical", }, { author: "CNNVD", id: "CNNVD-202302-1435", trust: 0.6, value: "CRITICAL", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-019900", }, { db: "CNNVD", id: "CNNVD-202302-1435", }, { db: "NVD", id: "CVE-2022-39954", }, { db: "NVD", id: "CVE-2022-39954", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "An improper restriction of xml external entity reference in Fortinet FortiNAC version 9.4.0 through 9.4.1, FortiNAC version 9.2.0 through 9.2.7, FortiNAC version 9.1.0 through 9.1.8, FortiNAC version 8.8.0 through 8.8.11, FortiNAC version 8.7.0 through 8.7.6, FortiNAC version 8.6.0 through 8.6.5, FortiNAC version 8.5.0 through 8.5.4, FortiNAC version 8.3.7 allows attacker to read arbitrary files or trigger a denial of service via specifically crafted XML documents. fortinet's FortiNAC and FortiNAC-F for, XML There is a vulnerability in an external entity.Information is obtained and service operation is interrupted (DoS) It may be in a state", sources: [ { db: "NVD", id: "CVE-2022-39954", }, { db: "JVNDB", id: "JVNDB-2022-019900", }, { db: "VULHUB", id: "VHN-435751", }, { db: "VULMON", id: "CVE-2022-39954", }, ], trust: 1.8, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-39954", trust: 3.4, }, { db: "JVNDB", id: "JVNDB-2022-019900", trust: 0.8, }, { db: "AUSCERT", id: "ESB-2023.1054", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202302-1435", trust: 0.6, }, { db: "VULHUB", id: "VHN-435751", trust: 0.1, }, { db: "VULMON", id: "CVE-2022-39954", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-435751", }, { db: "VULMON", id: "CVE-2022-39954", }, { db: "JVNDB", id: "JVNDB-2022-019900", }, { db: "CNNVD", id: "CNNVD-202302-1435", }, { db: "NVD", id: "CVE-2022-39954", }, ], }, id: "VAR-202302-1353", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-435751", }, ], trust: 0.01, }, last_update_date: "2024-08-14T14:30:44.521000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "FG-IR-22-304", trust: 0.8, url: "https://www.fortiguard.com/psirt/FG-IR-22-304", }, { title: "Fortinet FortiNAC Fixes for code issue vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=226975", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-019900", }, { db: "CNNVD", id: "CNNVD-202302-1435", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-611", trust: 1.1, }, { problemtype: "XML Improper restriction of external entity references (CWE-611) [NVD evaluation ]", trust: 0.8, }, ], sources: [ { db: "VULHUB", id: "VHN-435751", }, { db: "JVNDB", id: "JVNDB-2022-019900", }, { db: "NVD", id: "CVE-2022-39954", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://fortiguard.com/psirt/fg-ir-22-304", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2022-39954", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-39954/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2023.1054", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULHUB", id: "VHN-435751", }, { db: "VULMON", id: "CVE-2022-39954", }, { db: "JVNDB", id: "JVNDB-2022-019900", }, { db: "CNNVD", id: "CNNVD-202302-1435", }, { db: "NVD", id: "CVE-2022-39954", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-435751", }, { db: "VULMON", id: "CVE-2022-39954", }, { db: "JVNDB", id: "JVNDB-2022-019900", }, { db: "CNNVD", id: "CNNVD-202302-1435", }, { db: "NVD", id: "CVE-2022-39954", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-02-16T00:00:00", db: "VULHUB", id: "VHN-435751", }, { date: "2023-02-16T00:00:00", db: "VULMON", id: "CVE-2022-39954", }, { date: "2023-10-30T00:00:00", db: "JVNDB", id: "JVNDB-2022-019900", }, { date: "2023-02-16T00:00:00", db: "CNNVD", id: "CNNVD-202302-1435", }, { date: "2023-02-16T19:15:13.120000", db: "NVD", id: "CVE-2022-39954", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-02-27T00:00:00", db: "VULHUB", id: "VHN-435751", }, { date: "2023-02-16T00:00:00", db: "VULMON", id: "CVE-2022-39954", }, { date: "2023-10-30T01:08:00", db: "JVNDB", id: "JVNDB-2022-019900", }, { date: "2023-02-28T00:00:00", db: "CNNVD", id: "CNNVD-202302-1435", }, { date: "2023-11-07T03:50:41.493000", db: "NVD", id: "CVE-2022-39954", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202302-1435", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "fortinet's FortiNAC and FortiNAC-F In XML External entity vulnerabilities", sources: [ { db: "JVNDB", id: "JVNDB-2022-019900", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "code problem", sources: [ { db: "CNNVD", id: "CNNVD-202302-1435", }, ], trust: 0.6, }, }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-329 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-329 | Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "1AA31846-D095-4DC1-8FFC-B28447054A81", versionEndExcluding: "9.2.7", versionStartIncluding: "9.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "84AEE221-36B9-41D6-A09F-B0D81AA79576", versionEndExcluding: "9.4.2", versionStartIncluding: "9.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac-f:*:*:*:*:*:*:*:*", matchCriteriaId: "C3979307-56D3-48DC-A09E-8FF75FE38664", versionEndExcluding: "7.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An improper authorization vulnerability [CWE-285] in Fortinet FortiNAC version 9.4.0 through 9.4.1 and before 9.2.6 allows an unauthenticated user to perform some administrative operations over the FortiNAC instance via crafted HTTP POST requests.", }, ], id: "CVE-2022-38375", lastModified: "2024-11-21T07:16:20.970", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.2, source: "psirt@fortinet.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-02-16T19:15:12.797", references: [ { source: "psirt@fortinet.com", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-329", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-329", }, ], sourceIdentifier: "psirt@fortinet.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-285", }, ], source: "psirt@fortinet.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-409 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-409 | Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "2638973E-2258-4D0F-AF28-36D63652141D", versionEndIncluding: "9.2.7", versionStartIncluding: "8.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "84AEE221-36B9-41D6-A09F-B0D81AA79576", versionEndExcluding: "9.4.2", versionStartIncluding: "9.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac-f:*:*:*:*:*:*:*:*", matchCriteriaId: "C3979307-56D3-48DC-A09E-8FF75FE38664", versionEndExcluding: "7.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.11 and below, 8.7.6 and below may allow an unauthenticated attacker to access sensitive information via crafted HTTP requests.", }, ], id: "CVE-2022-43951", lastModified: "2024-11-21T07:27:24.150", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@fortinet.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-04-11T17:15:07.787", references: [ { source: "psirt@fortinet.com", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-409", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-409", }, ], sourceIdentifier: "psirt@fortinet.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "psirt@fortinet.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-304 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-304 | Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "B1A805AE-3A46-4F20-8F7D-7E9E8EE609D5", versionEndIncluding: "9.2.7", versionStartIncluding: "8.3.7", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "84AEE221-36B9-41D6-A09F-B0D81AA79576", versionEndExcluding: "9.4.2", versionStartIncluding: "9.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac-f:*:*:*:*:*:*:*:*", matchCriteriaId: "C3979307-56D3-48DC-A09E-8FF75FE38664", versionEndExcluding: "7.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An improper restriction of xml external entity reference in Fortinet FortiNAC version 9.4.0 through 9.4.1, FortiNAC version 9.2.0 through 9.2.7, FortiNAC version 9.1.0 through 9.1.8, FortiNAC version 8.8.0 through 8.8.11, FortiNAC version 8.7.0 through 8.7.6, FortiNAC version 8.6.0 through 8.6.5, FortiNAC version 8.5.0 through 8.5.4, FortiNAC version 8.3.7 allows attacker to read arbitrary files or trigger a denial of service via specifically crafted XML documents.", }, ], id: "CVE-2022-39954", lastModified: "2024-11-21T07:18:33.333", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.4, source: "psirt@fortinet.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-02-16T19:15:13.120", references: [ { source: "psirt@fortinet.com", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-304", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-304", }, ], sourceIdentifier: "psirt@fortinet.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-611", }, ], source: "psirt@fortinet.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-611", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
9.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-23-013 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-23-013 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
fortinet | fortinac | * | |
fortinet | fortinac-f | 7.2.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "FD2141D0-A01A-471E-8FF3-D132897921E4", versionEndExcluding: "9.4.3", versionStartIncluding: "8.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "77DE647F-0252-42E2-8BDD-C98DC899C613", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in License Management would permit an authenticated attacker to trigger remote code execution via crafted licenses.", }, ], id: "CVE-2023-22637", lastModified: "2024-11-21T07:45:06.120", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.6, impactScore: 5.9, source: "psirt@fortinet.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-05-03T22:15:17.337", references: [ { source: "psirt@fortinet.com", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-23-013", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-23-013", }, ], sourceIdentifier: "psirt@fortinet.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@fortinet.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-456 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-456 | Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "C07AF172-49D7-4F20-8A6B-7640C1FE3600", versionEndIncluding: "9.1.8", versionStartIncluding: "8.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "1AA31846-D095-4DC1-8FFC-B28447054A81", versionEndExcluding: "9.2.7", versionStartIncluding: "9.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "84AEE221-36B9-41D6-A09F-B0D81AA79576", versionEndExcluding: "9.4.2", versionStartIncluding: "9.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "77DE647F-0252-42E2-8BDD-C98DC899C613", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An insufficiently protected credentials vulnerability [CWE-522] in FortiNAC-F 7.2.0, FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.0 all versions, 8.7.0 all versions may allow a local attacker with system access to retrieve users' passwords.", }, ], id: "CVE-2022-45859", lastModified: "2024-11-21T07:29:51.237", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 0.5, impactScore: 3.6, source: "psirt@fortinet.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-05-03T22:15:15.553", references: [ { source: "psirt@fortinet.com", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-456", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-456", }, ], sourceIdentifier: "psirt@fortinet.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-522", }, ], source: "psirt@fortinet.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-522", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-521 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-521 | Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "3BD32B25-76B4-4D6E-BB5C-065070297058", versionEndIncluding: "8.7.6", versionStartIncluding: "8.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "46929BE3-0396-4B8A-9889-9F6CA73FAD4E", versionEndIncluding: "8.8.11", versionStartIncluding: "8.8.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "4DFD62C8-07EF-4C7C-B18B-414A9C4A2955", versionEndIncluding: "9.1.8", versionStartIncluding: "9.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "9331C47E-0CA4-4B2F-A89F-5C0AAEF3ECAA", versionEndIncluding: "9.2.6", versionStartIncluding: "9.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:9.4.0:*:*:*:*:*:*:*", matchCriteriaId: "E12E11B0-E21A-4124-9DF9-FF268BB19813", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:9.4.1:*:*:*:*:*:*:*", matchCriteriaId: "4648F862-AB8C-4B8D-8F2D-5D2641F08845", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "77DE647F-0252-42E2-8BDD-C98DC899C613", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An improper permissions, privileges, and access controls vulnerability [CWE-264] in FortiNAC-F 7.2.0, FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.0 all versions 8.7.0 all versions may allow an unauthenticated attacker to perform a DoS attack on the device via client-secure renegotiation.", }, ], id: "CVE-2023-22633", lastModified: "2024-11-21T07:45:05.623", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "psirt@fortinet.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-06-13T09:15:16.127", references: [ { source: "psirt@fortinet.com", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-521", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-521", }, ], sourceIdentifier: "psirt@fortinet.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "psirt@fortinet.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-464 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-464 | Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "D7321AAB-1859-43BE-A84C-92620389287F", versionEndIncluding: "9.2.6", versionStartIncluding: "8.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "84AEE221-36B9-41D6-A09F-B0D81AA79576", versionEndExcluding: "9.4.2", versionStartIncluding: "9.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "77DE647F-0252-42E2-8BDD-C98DC899C613", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A weak authentication vulnerability [CWE-1390] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in device registration page may allow an unauthenticated attacker to perform password spraying attacks with an increased chance of success.", }, ], id: "CVE-2022-45860", lastModified: "2024-11-21T07:29:51.380", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@fortinet.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-05-03T22:15:15.670", references: [ { source: "psirt@fortinet.com", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-464", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-464", }, ], sourceIdentifier: "psirt@fortinet.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-1390", }, ], source: "psirt@fortinet.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-520 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-520 | Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "2638973E-2258-4D0F-AF28-36D63652141D", versionEndIncluding: "9.2.7", versionStartIncluding: "8.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "D2DF0CAE-9209-4DEC-8197-11F9D34D7C8A", versionEndExcluding: "9.4.3", versionStartIncluding: "9.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "77DE647F-0252-42E2-8BDD-C98DC899C613", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A use of hard-coded credentials vulnerability [CWE-798] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions may allow an authenticated attacker to access to the database via shell commands.", }, ], id: "CVE-2023-26203", lastModified: "2024-11-21T07:50:54.487", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "psirt@fortinet.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-05-03T22:15:18.357", references: [ { source: "psirt@fortinet.com", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-520", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-520", }, ], sourceIdentifier: "psirt@fortinet.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-798", }, ], source: "psirt@fortinet.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-798", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
4.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-407 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-407 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
fortinet | fortinac | * | |
fortinet | fortinac-f | 7.2.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "2A30BF9D-B074-42C5-8C46-15651E379371", versionEndExcluding: "9.4.2", versionStartIncluding: "8.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "77DE647F-0252-42E2-8BDD-C98DC899C613", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A URL redirection to untrusted site ('Open Redirect') vulnerability [CWE-601] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.1 and below, 9.2 all versions, 9.1 all versions, \r\n 8.8 all versions, 8.7 all versions may allow an unauthenticated attacker to redirect users to any arbitrary website via a crafted URL.", }, ], id: "CVE-2022-43950", lastModified: "2024-11-21T07:27:24.033", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "psirt@fortinet.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-05-03T22:15:09.417", references: [ { source: "psirt@fortinet.com", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-407", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-407", }, ], sourceIdentifier: "psirt@fortinet.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-601", }, ], source: "psirt@fortinet.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-601", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-312 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-312 | Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "B1A805AE-3A46-4F20-8F7D-7E9E8EE609D5", versionEndIncluding: "9.2.7", versionStartIncluding: "8.3.7", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", matchCriteriaId: "84AEE221-36B9-41D6-A09F-B0D81AA79576", versionEndExcluding: "9.4.2", versionStartIncluding: "9.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortinet:fortinac-f:*:*:*:*:*:*:*:*", matchCriteriaId: "C3979307-56D3-48DC-A09E-8FF75FE38664", versionEndExcluding: "7.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Some cryptographic issues in Fortinet FortiNAC versions 9.4.0 through 9.4.1, 9.2.0 through 9.2.7, 9.1.0 through 9.1.8, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an attacker to decrypt and forge protocol communication messages.", }, ], id: "CVE-2022-40675", lastModified: "2024-11-21T07:21:49.883", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 2.5, source: "psirt@fortinet.com", type: "Secondary", }, { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-02-16T19:15:13.187", references: [ { source: "psirt@fortinet.com", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-312", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://fortiguard.com/psirt/FG-IR-22-312", }, ], sourceIdentifier: "psirt@fortinet.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-310", }, ], source: "psirt@fortinet.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2023-22633
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T10:13:49.456Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-521", tags: [ "x_transferred", ], url: "https://fortiguard.com/psirt/FG-IR-22-521", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-22633", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T14:15:36.164159Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T14:26:31.560Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "FortiNAC", vendor: "Fortinet", versions: [ { lessThanOrEqual: "9.4.1", status: "affected", version: "9.4.0", versionType: "semver", }, { lessThanOrEqual: "9.2.6", status: "affected", version: "9.2.0", versionType: "semver", }, { lessThanOrEqual: "9.1.8", status: "affected", version: "9.1.0", versionType: "semver", }, { lessThanOrEqual: "8.8.11", status: "affected", version: "8.8.0", versionType: "semver", }, { lessThanOrEqual: "8.7.6", status: "affected", version: "8.7.0", versionType: "semver", }, { status: "affected", version: "7.2.0", }, ], }, ], descriptions: [ { lang: "en", value: "An improper permissions, privileges, and access controls vulnerability [CWE-264] in FortiNAC-F 7.2.0, FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.0 all versions 8.7.0 all versions may allow an unauthenticated attacker to perform a DoS attack on the device via client-secure renegotiation.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:X/RL:X/RC:R", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-264", description: "Denial of service", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-06-13T08:41:44.268Z", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-521", url: "https://fortiguard.com/psirt/FG-IR-22-521", }, ], solutions: [ { lang: "en", value: "Please upgrade to FortiNAC-F version 7.2.1 or above\r\nPlease upgrade to FortiNAC version 9.4.2 or above\r\nPlease upgrade to FortiNAC version 9.2.7 or above\r\nPlease upgrade to FortiNAC version 9.1.9 or above", }, ], }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2023-22633", datePublished: "2023-06-13T08:41:44.268Z", dateReserved: "2023-01-05T10:06:31.521Z", dateUpdated: "2024-10-23T14:26:31.560Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-45860
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T14:24:03.201Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-464", tags: [ "x_transferred", ], url: "https://fortiguard.com/psirt/FG-IR-22-464", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-45860", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T14:15:37.857189Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T14:27:55.045Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "FortiNAC", vendor: "Fortinet", versions: [ { lessThanOrEqual: "9.4.2", status: "affected", version: "9.4.0", versionType: "semver", }, { lessThanOrEqual: "9.2.6", status: "affected", version: "9.2.0", versionType: "semver", }, { lessThanOrEqual: "9.1.9", status: "affected", version: "9.1.0", versionType: "semver", }, { lessThanOrEqual: "8.8.11", status: "affected", version: "8.8.0", versionType: "semver", }, { lessThanOrEqual: "8.7.6", status: "affected", version: "8.7.0", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "A weak authentication vulnerability [CWE-1390] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in device registration page may allow an unauthenticated attacker to perform password spraying attacks with an increased chance of success.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:X/RC:R", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-1390", description: "Improper access control", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-05-03T21:26:57.148Z", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-464", url: "https://fortiguard.com/psirt/FG-IR-22-464", }, ], solutions: [ { lang: "en", value: "Please upgrade to FortiNAC version 9.4.3 or above\r\nPlease upgrade to FortiNAC-F version 7.2.1 or above", }, ], }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2022-45860", datePublished: "2023-05-03T21:26:57.148Z", dateReserved: "2022-11-23T14:57:05.613Z", dateUpdated: "2024-10-23T14:27:55.045Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-48785
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Fortinet | FortiNAC-F |
Version: 7.2.0 ≤ 7.2.4 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2023-48785", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-03-14T17:13:32.966472Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-14T17:17:09.570Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { cpes: [], defaultStatus: "unaffected", product: "FortiNAC-F", vendor: "Fortinet", versions: [ { lessThanOrEqual: "7.2.4", status: "affected", version: "7.2.0", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An improper certificate validation vulnerability [CWE-295] in FortiNAC-F version 7.2.4 and below may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the HTTPS communication channel between the FortiOS device, an inventory, and FortiNAC-F.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:X/RC:X", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-295", description: "Information disclosure", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-14T15:46:57.799Z", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-23-288", url: "https://fortiguard.com/psirt/FG-IR-23-288", }, ], solutions: [ { lang: "en", value: "Please upgrade to FortiNAC-F version 7.4.0 or above \nPlease upgrade to FortiNAC-F version 7.2.5 or above", }, ], }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2023-48785", datePublished: "2025-03-14T15:46:57.799Z", dateReserved: "2023-11-19T19:58:38.554Z", dateUpdated: "2025-03-14T17:17:09.570Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-22637
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T10:13:49.469Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-23-013", tags: [ "x_transferred", ], url: "https://fortiguard.com/psirt/FG-IR-23-013", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-22637", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T14:11:05.236636Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T14:27:38.847Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "FortiNAC", vendor: "Fortinet", versions: [ { lessThanOrEqual: "9.4.2", status: "affected", version: "9.4.0", versionType: "semver", }, { lessThanOrEqual: "9.2.7", status: "affected", version: "9.2.0", versionType: "semver", }, { lessThanOrEqual: "9.1.9", status: "affected", version: "9.1.0", versionType: "semver", }, { lessThanOrEqual: "8.8.11", status: "affected", version: "8.8.0", versionType: "semver", }, { lessThanOrEqual: "8.7.6", status: "affected", version: "8.7.0", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in License Management would permit an authenticated attacker to trigger remote code execution via crafted licenses.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Execute unauthorized code or commands", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-05-03T21:27:03.507Z", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-23-013", url: "https://fortiguard.com/psirt/FG-IR-23-013", }, ], solutions: [ { lang: "en", value: "Please upgrade to FortiNAC-F version 7.2.1 or above\r\nPlease upgrade to FortiNAC version 9.4.3 or above", }, ], }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2023-22637", datePublished: "2023-05-03T21:27:03.507Z", dateReserved: "2023-01-05T10:06:31.522Z", dateUpdated: "2024-10-23T14:27:38.847Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-26203
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T11:39:06.592Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-520", tags: [ "x_transferred", ], url: "https://fortiguard.com/psirt/FG-IR-22-520", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-26203", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T14:11:06.726078Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T14:27:47.396Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "FortiNAC", vendor: "Fortinet", versions: [ { lessThanOrEqual: "9.4.1", status: "affected", version: "9.4.0", versionType: "semver", }, { lessThanOrEqual: "9.2.7", status: "affected", version: "9.2.0", versionType: "semver", }, { lessThanOrEqual: "9.1.9", status: "affected", version: "9.1.0", versionType: "semver", }, { lessThanOrEqual: "8.8.11", status: "affected", version: "8.8.0", versionType: "semver", }, { lessThanOrEqual: "8.7.6", status: "affected", version: "8.7.0", versionType: "semver", }, { status: "affected", version: "7.2.0", }, ], }, ], descriptions: [ { lang: "en", value: "A use of hard-coded credentials vulnerability [CWE-798] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions may allow an authenticated attacker to access to the database via shell commands.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-798", description: "Improper access control", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-05-03T21:27:00.343Z", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-520", url: "https://fortiguard.com/psirt/FG-IR-22-520", }, ], solutions: [ { lang: "en", value: "Please upgrade to FortiNAC version 9.4.3 or above\r\nPlease upgrade to FortiNAC-F version 7.2.1 or above", }, ], }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2023-26203", datePublished: "2023-05-03T21:27:00.343Z", dateReserved: "2023-02-20T15:09:20.635Z", dateUpdated: "2024-10-23T14:27:47.396Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-43951
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T13:47:04.389Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-409", tags: [ "x_transferred", ], url: "https://fortiguard.com/psirt/FG-IR-22-409", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-43951", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T14:15:39.451206Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T14:30:12.648Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "FortiNAC", vendor: "Fortinet", versions: [ { lessThanOrEqual: "9.4.1", status: "affected", version: "9.4.0", versionType: "semver", }, { lessThanOrEqual: "9.2.7", status: "affected", version: "9.2.0", versionType: "semver", }, { lessThanOrEqual: "9.1.9", status: "affected", version: "9.1.0", versionType: "semver", }, { lessThanOrEqual: "8.8.11", status: "affected", version: "8.8.0", versionType: "semver", }, { lessThanOrEqual: "8.7.6", status: "affected", version: "8.7.0", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.11 and below, 8.7.6 and below may allow an unauthenticated attacker to access sensitive information via crafted HTTP requests.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "Information disclosure", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-11T16:05:46.705Z", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-409", url: "https://fortiguard.com/psirt/FG-IR-22-409", }, ], solutions: [ { lang: "en", value: "Please upgrade to FortiNAC-F version 7.2.0 or above\r\nPlease upgrade to FortiNAC version 9.4.2 or above", }, ], }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2022-43951", datePublished: "2023-04-11T16:05:46.705Z", dateReserved: "2022-10-27T07:40:06.589Z", dateUpdated: "2024-10-23T14:30:12.648Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-39954
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T12:07:42.979Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-304", tags: [ "x_transferred", ], url: "https://fortiguard.com/psirt/FG-IR-22-304", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-39954", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T14:15:46.786394Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T14:45:55.394Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "FortiNAC", vendor: "Fortinet", versions: [ { lessThanOrEqual: "9.4.1", status: "affected", version: "9.4.0", versionType: "semver", }, { lessThanOrEqual: "9.2.7", status: "affected", version: "9.2.0", versionType: "semver", }, { lessThanOrEqual: "9.1.8", status: "affected", version: "9.1.0", versionType: "semver", }, { lessThanOrEqual: "8.8.11", status: "affected", version: "8.8.0", versionType: "semver", }, { lessThanOrEqual: "8.7.6", status: "affected", version: "8.7.0", versionType: "semver", }, { lessThanOrEqual: "8.6.5", status: "affected", version: "8.6.0", versionType: "semver", }, { lessThanOrEqual: "8.5.4", status: "affected", version: "8.5.0", versionType: "semver", }, { status: "affected", version: "8.3.7", }, ], }, ], descriptions: [ { lang: "en", value: "An improper restriction of xml external entity reference in Fortinet FortiNAC version 9.4.0 through 9.4.1, FortiNAC version 9.2.0 through 9.2.7, FortiNAC version 9.1.0 through 9.1.8, FortiNAC version 8.8.0 through 8.8.11, FortiNAC version 8.7.0 through 8.7.6, FortiNAC version 8.6.0 through 8.6.5, FortiNAC version 8.5.0 through 8.5.4, FortiNAC version 8.3.7 allows attacker to read arbitrary files or trigger a denial of service via specifically crafted XML documents.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.9, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:U/RC:C", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-611", description: "Information disclosure", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-16T18:06:50.083Z", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-304", url: "https://fortiguard.com/psirt/FG-IR-22-304", }, ], solutions: [ { lang: "en", value: "Please upgrade to FortiNAC version 9.4.2 or above\r\nPlease upgrade to FortiNAC version 7.2.0 or above", }, ], }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2022-39954", datePublished: "2023-02-16T18:06:50.083Z", dateReserved: "2022-09-05T13:11:35.554Z", dateUpdated: "2024-10-23T14:45:55.394Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-45859
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T14:24:03.182Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-456", tags: [ "x_transferred", ], url: "https://fortiguard.com/psirt/FG-IR-22-456", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-45859", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-22T20:18:08.454234Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-22T20:46:40.435Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "FortiNAC", vendor: "Fortinet", versions: [ { lessThanOrEqual: "9.4.1", status: "affected", version: "9.4.0", versionType: "semver", }, { lessThanOrEqual: "9.2.6", status: "affected", version: "9.2.0", versionType: "semver", }, { lessThanOrEqual: "9.1.8", status: "affected", version: "9.1.0", versionType: "semver", }, { lessThanOrEqual: "8.8.11", status: "affected", version: "8.8.0", versionType: "semver", }, { lessThanOrEqual: "8.7.6", status: "affected", version: "8.7.0", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An insufficiently protected credentials vulnerability [CWE-522] in FortiNAC-F 7.2.0, FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.0 all versions, 8.7.0 all versions may allow a local attacker with system access to retrieve users' passwords.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.9, baseSeverity: "LOW", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:F/RL:X/RC:R", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-522", description: "Improper access control", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-05-03T21:26:47.577Z", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-456", url: "https://fortiguard.com/psirt/FG-IR-22-456", }, ], solutions: [ { lang: "en", value: "Please upgrade to FortiNAC-F version 7.2.1 or above\r\nPlease upgrade to FortiNAC version 9.4.2 or above\r\nPlease upgrade to FortiNAC version 9.2.7 or above\nAfter the upgrade, the CLI account password should be changed.\r\nTo know which accounts require a new password, the following command can be run:\ngrep \":\\$1\" /etc/shadow\nThen, login to the CLI with that user and type \"passwd\" to change the password and update the hash.", }, ], }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2022-45859", datePublished: "2023-05-03T21:26:47.577Z", dateReserved: "2022-11-23T14:57:05.612Z", dateUpdated: "2024-10-22T20:46:40.435Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-40675
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T12:21:46.371Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-312", tags: [ "x_transferred", ], url: "https://fortiguard.com/psirt/FG-IR-22-312", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-40675", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T14:15:45.634338Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T14:32:50.215Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "FortiNAC", vendor: "Fortinet", versions: [ { lessThanOrEqual: "9.4.1", status: "affected", version: "9.4.0", versionType: "semver", }, { lessThanOrEqual: "9.2.7", status: "affected", version: "9.2.0", versionType: "semver", }, { lessThanOrEqual: "9.1.8", status: "affected", version: "9.1.0", versionType: "semver", }, { lessThanOrEqual: "8.8.11", status: "affected", version: "8.8.0", versionType: "semver", }, { lessThanOrEqual: "8.7.6", status: "affected", version: "8.7.0", versionType: "semver", }, { lessThanOrEqual: "8.6.5", status: "affected", version: "8.6.0", versionType: "semver", }, { lessThanOrEqual: "8.5.4", status: "affected", version: "8.5.0", versionType: "semver", }, { status: "affected", version: "8.3.7", }, ], }, ], descriptions: [ { lang: "en", value: "Some cryptographic issues in Fortinet FortiNAC versions 9.4.0 through 9.4.1, 9.2.0 through 9.2.7, 9.1.0 through 9.1.8, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an attacker to decrypt and forge protocol communication messages.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:U/RC:C", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-310", description: "Information disclosure", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-16T18:06:52.567Z", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-312", url: "https://fortiguard.com/psirt/FG-IR-22-312", }, ], solutions: [ { lang: "en", value: "Please upgrade to FortiNAC version 9.4.2 or above\r\nPlease upgrade to FortiNAC version 7.2.0 or above", }, ], }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2022-40675", datePublished: "2023-02-16T18:06:52.567Z", dateReserved: "2022-09-14T13:17:43.616Z", dateUpdated: "2024-10-23T14:32:50.215Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-43950
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T13:47:04.368Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-407", tags: [ "x_transferred", ], url: "https://fortiguard.com/psirt/FG-IR-22-407", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-43950", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-22T20:18:07.298715Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-22T20:46:32.741Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "FortiNAC", vendor: "Fortinet", versions: [ { lessThanOrEqual: "9.4.1", status: "affected", version: "9.4.0", versionType: "semver", }, { lessThanOrEqual: "9.2.7", status: "affected", version: "9.2.0", versionType: "semver", }, { lessThanOrEqual: "9.1.9", status: "affected", version: "9.1.0", versionType: "semver", }, { lessThanOrEqual: "8.8.11", status: "affected", version: "8.8.0", versionType: "semver", }, { lessThanOrEqual: "8.7.6", status: "affected", version: "8.7.0", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "A URL redirection to untrusted site ('Open Redirect') vulnerability [CWE-601] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.1 and below, 9.2 all versions, 9.1 all versions, \r\n 8.8 all versions, 8.7 all versions may allow an unauthenticated attacker to redirect users to any arbitrary website via a crafted URL.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 3.9, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-601", description: "Execute unauthorized code or commands", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-05-03T21:26:50.797Z", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-407", url: "https://fortiguard.com/psirt/FG-IR-22-407", }, ], solutions: [ { lang: "en", value: "Please upgrade to FortiNAC version 9.4.2 or above\r\nPlease upgrade to FortiNAC-F version 7.2.1 or above", }, ], }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2022-43950", datePublished: "2023-05-03T21:26:50.797Z", dateReserved: "2022-10-27T07:40:06.589Z", dateUpdated: "2024-10-22T20:46:32.741Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-38375
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T10:54:03.270Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-329", tags: [ "x_transferred", ], url: "https://fortiguard.com/psirt/FG-IR-22-329", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-38375", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T14:15:48.274436Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T14:46:49.340Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "FortiNAC", vendor: "Fortinet", versions: [ { lessThanOrEqual: "9.4.1", status: "affected", version: "9.4.0", versionType: "semver", }, { lessThanOrEqual: "9.2.6", status: "affected", version: "9.2.0", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An improper authorization vulnerability [CWE-285] in Fortinet FortiNAC version 9.4.0 through 9.4.1 and before 9.2.6 allows an unauthenticated user to perform some administrative operations over the FortiNAC instance via crafted HTTP POST requests.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H/E:P/RL:U/RC:C", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-285", description: "Execute unauthorized code or commands", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-16T18:06:21.944Z", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { name: "https://fortiguard.com/psirt/FG-IR-22-329", url: "https://fortiguard.com/psirt/FG-IR-22-329", }, ], solutions: [ { lang: "en", value: "Please upgrade to FortiNAC-F version 7.2.0 or above\r\nPlease upgrade to FortiNAC version 9.4.2 or above\r\nPlease upgrade to FortiNAC version 9.2.7 or above", }, ], }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2022-38375", datePublished: "2023-02-16T18:06:21.944Z", dateReserved: "2022-08-16T14:17:48.479Z", dateUpdated: "2024-10-23T14:46:49.340Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }