Description
A improper verification of source of a communication channel in Fortinet FortiOS with IPS engine version 7.201 through 7.214, 7.001 through 7.113, 6.001 through 6.121, 5.001 through 5.258 and before 4.086 allows a remote and unauthenticated attacker to trigger the sending of "blocked page" HTML data to an arbitrary victim via crafted TCP requests, potentially flooding the victim.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-31992 | A improper verification of source of a communication channel in Fortinet FortiOS with IPS engine version 7.201 through 7.214, 7.001 through 7.113, 6.001 through 6.121, 5.001 through 5.258 and before 4.086 allows a remote and unauthenticated attacker to trigger the sending of "blocked page" HTML data to an arbitrary victim via crafted TCP requests, potentially flooding the victim. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-22-073 |
|
History
Wed, 25 Feb 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-22T20:54:44.887Z
Reserved: 2022-03-21T00:00:00.000Z
Link: CVE-2022-27491
Updated: 2024-08-03T05:32:57.905Z
Status : Modified
Published: 2022-09-06T18:15:12.693
Modified: 2024-11-21T06:55:49.903
Link: CVE-2022-27491
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD