Lucene search

K
cve[email protected]CVE-2022-33871
HistoryFeb 16, 2023 - 7:15 p.m.

CVE-2022-33871

2023-02-1619:15:12
CWE-121
CWE-787
web.nvd.nist.gov
17
cve-2022-33871
fortiweb
cwe-121
buffer overflow
arbitrary code execution
cliζ“δ½œ

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.7%

A stack-based buffer overflow vulnerability [CWE-121] in FortiWeb version 7.0.1 and earlier, 6.4 all versions, version 6.3.19 and earlier may allow a privileged attacker to execute arbitrary code or commands via specifically crafted CLI execute backup-local rename and execute backup-local show operations.

Affected configurations

NVD
Node
fortinetfortiwebRange6.3.6–6.3.20
OR
fortinetfortiwebMatch6.4.0
OR
fortinetfortiwebMatch6.4.1
OR
fortinetfortiwebMatch6.4.2
OR
fortinetfortiwebMatch7.0.0
OR
fortinetfortiwebMatch7.0.1

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiWeb",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.3.6",
        "lessThanOrEqual": "6.3.19",
        "status": "affected"
      }
    ]
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.7%

Related for CVE-2022-33871