Lucene search

K
nvd[email protected]NVD:CVE-2022-45862
HistoryAug 13, 2024 - 4:15 p.m.

CVE-2022-45862

2024-08-1316:15:07
CWE-613
web.nvd.nist.gov
2
vulnerability
fortios
fortiproxy
fortipam
fortiswitchmanager
cwe-613
session expiration

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

20.0%

An insufficient session expiration vulnerability [CWE-613] vulnerability in FortiOS 7.2.5 and below, 7.0 all versions, 6.4 all versions; FortiProxy 7.2 all versions, 7.0 all versions; FortiPAM 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions; FortiSwitchManager 7.2.1 and below, 7.0 all versions GUI may allow attackers to re-use websessions after GUI logout, should they manage to acquire the required credentials.

Affected configurations

Nvd
Node
fortinetfortiproxyRange7.0.07.4.0
OR
fortinetfortiswitchmanagerRange7.0.07.2.2
OR
fortinetfortiosRange6.4.07.2.6
OR
fortinetfortipamRange1.0.01.4.0
VendorProductVersionCPE
fortinetfortiproxy*cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
fortinetfortiswitchmanager*cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*
fortinetfortios*cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
fortinetfortipam*cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

20.0%

Related for NVD:CVE-2022-45862