Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-31989 | A cross-site request forgery (CSRF) in Fortinet FortiVoiceEnterprise version 6.4.x, 6.0.x, FortiSwitch version 7.0.0 through 7.0.4, 6.4.0 through 6.4.10, 6.2.0 through 6.2.7, 6.0.x, FortiMail version 7.0.0 through 7.0.3, 6.4.0 through 6.4.6, 6.2.x, 6.0.x FortiRecorder version 6.4.0 through 6.4.2, 6.0.x, 2.7.x, 2.6.x, FortiNDR version 1.x.x allows a remote unauthenticated attacker to execute commands on the CLI via tricking an authenticated administrator to execute malicious GET requests. |
Solution
Please upgrade to FortiVoice version 7.0.0 or above Please upgrade to FortiVoice version 6.4.8 or above Please upgrade to FortiVoice version 6.0.12 or above Please upgrade to FortiRecorder version 7.0.0 or above Please upgrade to FortiRecorder version 6.4.3 or above Please upgrade to FortiRecorder version 6.0.12 or above Please upgrade to FortiSwitch version 7.2.0 or above Please upgrade to FortiSwitch version 7.0.5 or above Please upgrade to FortiSwitch version 6.4.11 or above Please upgrade to FortiNDR version 7.2.0 or above Please upgrade to FortiNDR version 7.1.1 or above Please upgrade to FortiNDR version 7.0.5 or above Please upgrade to FortiMail version 7.2.0 or above Please upgrade to FortiMail version 7.0.4 or above Please upgrade to FortiMail version 6.4.7 or above
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-22-038 |
![]() ![]() |
No history.

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-03T05:32:57.924Z
Reserved: 2022-03-21T16:03:48.575Z
Link: CVE-2022-27488

No data.

Status : Modified
Published: 2023-12-13T07:15:10.910
Modified: 2024-11-21T06:55:49.453
Link: CVE-2022-27488

No data.

No data.