Description
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as `root` via `execute` CLI commands.
Published: 2024-08-13
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Please upgrade to FortiDDoS version 5.7.1 or above Please upgrade to FortiDDoS version 5.6.2 or above Please upgrade to FortiDDoS version 5.5.2 or above Please upgrade to FortiDDoS version 5.4.3 or above Please upgrade to FortiDDoS-F version 6.5.1 or above Please upgrade to FortiDDoS-F version 6.4.2 or above

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-31987 A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as `root` via `execute` CLI commands.
References
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00582}

epss

{'score': 0.00458}


Thu, 22 Aug 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet
Fortinet fortiddos
Fortinet fortiddos-f
CPEs cpe:2.3:a:fortinet:fortiddos-f:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiddos-f:6.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiddos:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiddos:5.7.0:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiddos
Fortinet fortiddos-f

Wed, 14 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 16:00:00 +0000

Type Values Removed Values Added
Description A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as `root` via `execute` CLI commands.
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C'}


Subscriptions

Fortinet Fortiddos Fortiddos-f
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-08-14T14:41:14.087Z

Reserved: 2022-03-21T16:03:48.575Z

Link: CVE-2022-27486

cve-icon Vulnrichment

Updated: 2024-08-14T14:41:08.634Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-13T16:15:07.693

Modified: 2024-08-22T14:29:44.627

Link: CVE-2022-27486

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses