A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiADC version 7.0.0 through 7.0.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.6, 6.0.x, 5.x.x allows attacker to execute arbitrary shell code as `root` via CLI commands.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-31983 | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiADC version 7.0.0 through 7.0.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.6, 6.0.x, 5.x.x allows attacker to execute arbitrary shell code as `root` via CLI commands. |
Fixes
Solution
Please upgrade to FortiADC version 7.0.2 or above, Please upgrade to FortiADC version 6.2.4 or above.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-22-046 |
![]() ![]() |
History
Wed, 23 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-23T14:46:17.267Z
Reserved: 2022-03-21T16:03:48.573Z
Link: CVE-2022-27482

Updated: 2024-08-03T05:25:32.814Z

Status : Modified
Published: 2023-02-16T19:15:12.120
Modified: 2024-11-21T06:55:48.750
Link: CVE-2022-27482

No data.

No data.