A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as `root` via `execute` CLI commands.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-22-047 |
History
Thu, 22 Aug 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortiddos Fortinet fortiddos-f |
|
CPEs | cpe:2.3:a:fortinet:fortiddos-f:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiddos-f:6.5.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiddos:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiddos:5.7.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortiddos Fortinet fortiddos-f |
Wed, 14 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 13 Aug 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as `root` via `execute` CLI commands. | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2024-08-13T15:51:57.242Z
Updated: 2024-08-14T14:41:14.087Z
Reserved: 2022-03-21T16:03:48.575Z
Link: CVE-2022-27486
Vulnrichment
Updated: 2024-08-14T14:41:08.634Z
NVD
Status : Analyzed
Published: 2024-08-13T16:15:07.693
Modified: 2024-08-22T14:29:44.627
Link: CVE-2022-27486
Redhat
No data.