CVE-2022-35843

An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component 7.2.0,  7.0.0 through 7.0.7,  6.4.0 through 6.4.9, 6.2 all versions, 6.0 all versions and FortiProxy SSH login component 7.0.0 through 7.0.5, 2.0.0 through 2.0.10, 1.2.0 all versions may allow a remote and unauthenticated attacker to login into the device via sending specially crafted Access-Challenge response from the Radius server.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
fortinetCNA
7.7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 17%
VendorProductVersion
fortinetfortiproxy
1.2.0 ≤
𝑥
≤ 1.2.13
fortinetfortiproxy
2.0.0 ≤
𝑥
≤ 2.0.10
fortinetfortiproxy
7.0.0 ≤
𝑥
≤ 7.0.6
fortinetfortios
6.0.0 ≤
𝑥
≤ 6.0.15
fortinetfortios
6.2.0 ≤
𝑥
≤ 6.2.12
fortinetfortios
6.4.0 ≤
𝑥
≤ 6.4.9
fortinetfortios
7.0.0 ≤
𝑥
≤ 7.0.7
fortinetfortios
7.2.0
fortinetfortios
7.2.1
𝑥
= Vulnerable software versions