Impact
FortiDeceptor fails to neutralize argument delimiters, enabling attackers with super‑admin CLI access to send crafted HTTP requests that delete sensitive files. This flaw directly compromises the integrity and confidentiality of critical system data and is classified as a command injection weakness (CWE‑88).
Affected Systems
Fortinet FortiDeceptor versions 4.0 through 6.2.0 are vulnerable, including all intermediary releases of the 4.x, 5.x, and 6.x series. The fix is delivered in version 6.2.1 and later; earlier interim releases such as 6.1.0 also contain the correction.
Risk and Exploitability
The vulnerability carries a CVSS score of 6.0, indicating moderate severity. EPSS shows a probability of exploitation less than 1 %, which suggests the likelihood is low but not negligible, and the issue is not listed in the CISA KEV catalog. Exploitation requires possessing a super‑admin profile with CLI access and carefully crafted HTTP requests to invoke the vulnerable argument handling code.
OpenCVE Enrichment