Lucene search

K
vulnrichmentFortinetVULNRICHMENT:CVE-2022-27486
HistoryAug 13, 2024 - 3:51 p.m.

CVE-2022-27486

2024-08-1315:51:57
CWE-78
fortinet
github.com
3
cve-2022-27486
fortinet
fortiddos
fortiddos-f
command injection
authentication
shell code
root access

CVSS3

6.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C

AI Score

7.3

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

A improper neutralization of special elements used in an os command (β€˜os command injection’) in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as rootΒ via execute CLI commands.

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiDDoS",
    "versions": [
      {
        "status": "affected",
        "version": "5.7.0"
      },
      {
        "status": "affected",
        "version": "5.5.0",
        "versionType": "semver",
        "lessThanOrEqual": "5.5.1"
      },
      {
        "status": "affected",
        "version": "5.4.0",
        "versionType": "semver",
        "lessThanOrEqual": "5.4.2"
      },
      {
        "status": "affected",
        "version": "5.3.0",
        "versionType": "semver",
        "lessThanOrEqual": "5.3.2"
      },
      {
        "status": "affected",
        "version": "5.2.0"
      },
      {
        "status": "affected",
        "version": "5.1.0"
      },
      {
        "status": "affected",
        "version": "5.0.0"
      },
      {
        "status": "affected",
        "version": "4.7.0"
      },
      {
        "status": "affected",
        "version": "4.6.0"
      },
      {
        "status": "affected",
        "version": "4.5.0"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "Fortinet",
    "product": "FortiDDoS-F",
    "versions": [
      {
        "status": "affected",
        "version": "6.5.0"
      },
      {
        "status": "affected",
        "version": "6.4.0",
        "versionType": "semver",
        "lessThanOrEqual": "6.4.1"
      },
      {
        "status": "affected",
        "version": "6.3.0",
        "versionType": "semver",
        "lessThanOrEqual": "6.3.4"
      },
      {
        "status": "affected",
        "version": "6.2.0",
        "versionType": "semver",
        "lessThanOrEqual": "6.2.2"
      },
      {
        "status": "affected",
        "version": "6.1.0",
        "versionType": "semver",
        "lessThanOrEqual": "6.1.5"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

6.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C

AI Score

7.3

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2022-27486