CVE-2022-42475
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/01/2023
Last modified:
24/02/2025
Description
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 5.0.0 (including) | 5.0.14 (including) |
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 5.2.0 (including) | 5.2.15 (including) |
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 5.4.0 (including) | 5.4.13 (including) |
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 5.6.0 (including) | 5.6.14 (including) |
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 6.0.0 (including) | 6.0.16 (excluding) |
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 6.2.0 (including) | 6.2.12 (excluding) |
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 6.4.0 (including) | 6.4.11 (excluding) |
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 7.0.0 (including) | 7.0.9 (excluding) |
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 7.2.0 (including) | 7.2.3 (excluding) |
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* | 1.0.0 (including) | 1.0.7 (including) |
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* | 1.1.0 (including) | 1.1.6 (including) |
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* | 1.2.0 (including) | 1.2.13 (including) |
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* | 2.0.0 (including) | 2.0.12 (excluding) |
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* | 7.0.0 (including) | 7.0.8 (excluding) |
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* | 7.2.0 (including) | 7.2.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page