Description
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiADC version 7.0.0 through 7.0.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.6, 6.0.x, 5.x.x allows attacker to execute arbitrary shell code as `root` via CLI commands.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiADC version 7.0.2 or above, Please upgrade to FortiADC version 6.2.4 or above.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-31983 | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiADC version 7.0.0 through 7.0.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.6, 6.0.x, 5.x.x allows attacker to execute arbitrary shell code as `root` via CLI commands. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-22-046 |
|
History
Wed, 23 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-23T14:46:17.267Z
Reserved: 2022-03-21T16:03:48.573Z
Link: CVE-2022-27482
Updated: 2024-08-03T05:25:32.814Z
Status : Modified
Published: 2023-02-16T19:15:12.120
Modified: 2024-11-21T06:55:48.750
Link: CVE-2022-27482
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD