Lucene search

K
cvelistFortinetCVELIST:CVE-2022-26122
HistoryNov 02, 2022 - 12:00 a.m.

CVE-2022-26122

2022-11-0200:00:00
fortinet
www.cve.org
4
cve-2022-26122
cwe-345
data authenticity vulnerability
forticlient
fortimail
fortios
av engines
mime attachment.

CVSS3

4.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:P/RL:U/RC:R

AI Score

8.7

Confidence

High

EPSS

0.001

Percentile

31.8%

An insufficient verification of data authenticity vulnerability [CWE-345] in FortiClient, FortiMail and FortiOS AV engines version 6.2.168 and below and version 6.4.274 and below may allow an attacker to bypass the AV engine via manipulating MIME attachment with junk and pad characters in base64.

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "Fortinet AV Engine, FortiMail, FortiOS, FortiClient",
    "versions": [
      {
        "version": "AV Engine version 6.2.168 and below and version 6.4.274 and below.",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:P/RL:U/RC:R

AI Score

8.7

Confidence

High

EPSS

0.001

Percentile

31.8%

Related for CVELIST:CVE-2022-26122