- Description
- An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
- Source
- psirt@fortinet.com
- NVD status
- Analyzed
- Products
- fortiproxy, fortiswitchmanager, fortios
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Fortinet Multiple Products Authentication Bypass Vulnerability
- Exploit added on
- Oct 11, 2022
- Exploit action due
- Nov 1, 2022
- Required action
- Apply updates per vendor instructions.
- Hype score
- Not currently trending
Top 5 Trending CVEs: 1 - CVE-2024-6387 2 - CVE-2022-40684 3 - CVE-2016-5284 4 - CVE-2025-4123 5 - CVE-2023-48022 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
23 Nov 2025
153 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
Over 15,000 Fortigate firewall configs leaked by Belsen_Group, exposing vulnerabilities CVE-2024-55591 & CVE-2022-40684. Security of devices at risk. ⚠️ #Fortigate #DataLeak #USA #ThreatResearch link: https://t.co/yKOEpo7rQe https://t.co/tCv0O4ibpT
@TweetThreatNews
16 Jan 2025
314 Impressions
0 Retweets
2 Likes
1 Bookmark
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B778AD94-D279-42B4-A062-8231F14936B3",
"versionEndExcluding": "7.0.7",
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F302F8-482A-4DA9-BDD9-63886B202B52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4A6B0D-1614-443B-8EBA-A8FBC2E1A832",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2B73D78B-2270-45B7-854E-F985B8D88F3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A86B1AB3-F33E-461C-A19C-C3A51B47AC5F",
"versionEndExcluding": "7.0.7",
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2DDB271-0A73-4C94-B3CE-B766E99898C0",
"versionEndExcluding": "7.2.2",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]