A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as `root` via `execute` CLI commands.
References
History

Thu, 22 Aug 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet
Fortinet fortiddos
Fortinet fortiddos-f
CPEs cpe:2.3:a:fortinet:fortiddos-f:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiddos-f:6.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiddos:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiddos:5.7.0:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiddos
Fortinet fortiddos-f

Wed, 14 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 16:00:00 +0000

Type Values Removed Values Added
Description A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as `root` via `execute` CLI commands.
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published: 2024-08-13T15:51:57.242Z

Updated: 2024-08-14T14:41:14.087Z

Reserved: 2022-03-21T16:03:48.575Z

Link: CVE-2022-27486

cve-icon Vulnrichment

Updated: 2024-08-14T14:41:08.634Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-13T16:15:07.693

Modified: 2024-08-22T14:29:44.627

Link: CVE-2022-27486

cve-icon Redhat

No data.