Lucene search

K
nvd[email protected]NVD:CVE-2022-30306
HistoryFeb 16, 2023 - 7:15 p.m.

CVE-2022-30306

2023-02-1619:15:12
CWE-121
CWE-787
web.nvd.nist.gov
4
stack-based buffer overflow
fortiweb
cwe-121
arbitrary code execution
authenticated attacker
password crafted

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

36.6%

A stack-based buffer overflow vulnerability [CWE-121] in the CA sign functionality of FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted password.

Affected configurations

Nvd
Node
fortinetfortiwebRange6.3.66.3.20
OR
fortinetfortiwebMatch6.4.0
OR
fortinetfortiwebMatch6.4.1
OR
fortinetfortiwebMatch6.4.2
OR
fortinetfortiwebMatch7.0.0
OR
fortinetfortiwebMatch7.0.1
VendorProductVersionCPE
fortinetfortiweb*cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
fortinetfortiweb6.4.0cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:*
fortinetfortiweb6.4.1cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:*
fortinetfortiweb6.4.2cpe:2.3:a:fortinet:fortiweb:6.4.2:*:*:*:*:*:*:*
fortinetfortiweb7.0.0cpe:2.3:a:fortinet:fortiweb:7.0.0:*:*:*:*:*:*:*
fortinetfortiweb7.0.1cpe:2.3:a:fortinet:fortiweb:7.0.1:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

36.6%

Related for NVD:CVE-2022-30306