An improper certificate validation vulnerability [CWE-295] in FortiManager 7.0.1 and below, 6.4.6 and below; FortiAnalyzer 7.0.2 and below, 6.4.7 and below; FortiOS 6.2.x and 6.0.x; FortiSandbox 4.0.x, 3.2.x and 3.1.x may allow a network adjacent and unauthenticated attacker to man-in-the-middle the communication between the listed products and some external peers.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-18-292 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Sep 2023, 18:46
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://fortiguard.com/psirt/FG-IR-18-292 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.2 |
CWE | CWE-295 | |
First Time |
Fortinet fortimanager
Fortinet Fortinet fortios Fortinet fortianalyzer Fortinet fortisandbox |
|
CPE | cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimanager:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortianalyzer:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortianalyzer:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.1:*:*:*:*:*:*:* |
01 Sep 2023, 13:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-01 12:15
Updated : 2024-02-28 20:33
NVD link : CVE-2022-22305
Mitre link : CVE-2022-22305
CVE.ORG link : CVE-2022-22305
JSON object : View
Products Affected
fortinet
- fortimanager
- fortios
- fortianalyzer
- fortisandbox