Language:
Severity: Critical
ID: 165763
File Name: fortigate_FG-IR-22-377.nasl
Version: 1.10
Type: local
Family: Firewalls
Published: 10/7/2022
Updated: 10/29/2024
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Risk Factor: High
Score: 8.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-40684
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/o:fortinet:fortios
Required KB Items: Settings/ParanoidReport, Host/Fortigate/model, Host/Fortigate/version
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/6/2022
Vulnerability Publication Date: 10/6/2022
CISA Known Exploited Vulnerability Due Dates: 11/1/2022
Core Impact
Metasploit (Fortinet FortiOS, FortiProxy, and FortiSwitchManager authentication bypass.)
CVE: CVE-2022-40684
IAVA: 2022-A-0401-S