CVE-2022-27488
EUVD-2022-3198913.12.2023, 07:15
A cross-site request forgery (CSRF) in Fortinet FortiVoiceEnterprise version 6.4.x, 6.0.x, FortiSwitch version 7.0.0 through 7.0.4, 6.4.0 through 6.4.10, 6.2.0 through 6.2.7, 6.0.x, FortiMail version 7.0.0 through 7.0.3, 6.4.0 through 6.4.6, 6.2.x, 6.0.x FortiRecorder version 6.4.0 through 6.4.2, 6.0.x, 2.7.x, 2.6.x, FortiNDR version 1.x.x allows a remote unauthenticated attacker to execute commands on the CLI via tricking an authenticated administrator to execute malicious GET requests.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| fortinet | fortiai | 1.1.0 |
| fortinet | fortiai | 1.5.3 |
| fortinet | fortimail | 6.0.0 ≤ 𝑥 ≤ 6.0.12 |
| fortinet | fortimail | 6.2.0 ≤ 𝑥 ≤ 6.2.9 |
| fortinet | fortimail | 6.4.0 ≤ 𝑥 ≤ 6.4.6 |
| fortinet | fortimail | 7.0.0 ≤ 𝑥 ≤ 7.0.3 |
| fortinet | fortindr | 7.0.0 ≤ 𝑥 ≤ 7.0.4 |
| fortinet | fortindr | 7.1.0 |
| fortinet | fortirecorder | 2.6.0 ≤ 𝑥 ≤ 2.6.3 |
| fortinet | fortirecorder | 2.7.0 ≤ 𝑥 ≤ 2.7.7 |
| fortinet | fortirecorder | 6.0.0 ≤ 𝑥 ≤ 6.0.11 |
| fortinet | fortirecorder | 6.4.0 ≤ 𝑥 ≤ 6.4.2 |
| fortinet | fortivoice | 6.0.0 ≤ 𝑥 ≤ 6.0.11 |
| fortinet | fortivoice | 6.4.0 ≤ 𝑥 ≤ 6.4.7 |
| fortinet | fortiswitch | 6.0.0 ≤ 𝑥 ≤ 6.0.7 |
| fortinet | fortiswitch | 6.2.0 ≤ 𝑥 ≤ 6.2.7 |
| fortinet | fortiswitch | 6.4.0 ≤ 𝑥 ≤ 6.4.10 |
| fortinet | fortiswitch | 7.0.0 ≤ 𝑥 ≤ 7.0.4 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration