CVE-2022-22305

An improper certificate validation vulnerability [CWE-295] in FortiManager 7.0.1 and below, 6.4.6 and below; FortiAnalyzer 7.0.2 and below, 6.4.7 and below; FortiOS 6.2.x and 6.0.x; FortiSandbox 4.0.x, 3.2.x and 3.1.x may allow a network adjacent and unauthenticated attacker to man-in-the-middle the communication between the listed products and some external peers.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-18-292 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

History

07 Sep 2023, 18:46

Type Values Removed Values Added
References (MISC) https://fortiguard.com/psirt/FG-IR-18-292 - (MISC) https://fortiguard.com/psirt/FG-IR-18-292 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.2
First Time Fortinet fortios
Fortinet fortisandbox
Fortinet fortianalyzer
Fortinet fortimanager
Fortinet
CPE cpe:2.3:a:fortinet:fortianalyzer:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*
CWE CWE-295

01 Sep 2023, 13:39

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-01 12:15

Updated : 2023-12-10 15:14


NVD link : CVE-2022-22305

Mitre link : CVE-2022-22305

CVE.ORG link : CVE-2022-22305


JSON object : View

Products Affected

fortinet

  • fortios
  • fortisandbox
  • fortianalyzer
  • fortimanager
CWE
CWE-295

Improper Certificate Validation

CWE-297

Improper Validation of Certificate with Host Mismatch