An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
Published: 2022-10-07
Fortinet has patched a critical authentication bypass in its FortiOS and FortiProxy products that could lead to administrator access.
https://www.tenable.com/blog/aa23-215a-2022s-top-routinely-exploited-vulnerabilities
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
https://www.tenable.com/cyber-exposure/tenable-2022-threat-landscape-report
https://www.horizon3.ai/attack-research/attack-blogs/fortinet-iocs-cve-2022-40684/
https://www.tenable.com/blog/cve-2022-40684-critical-authentication-bypass-in-fortios-and-fortiproxy
https://fortiguard.com/psirt/FG-IR-22-377
http://packetstormsecurity.com/files/171515/Fortinet-7.2.1-Authentication-Bypass.html