CVE-2022-35843

EUVD-2022-38716
An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component 7.2.0,  7.0.0 through 7.0.7,  6.4.0 through 6.4.9, 6.2 all versions, 6.0 all versions and FortiProxy SSH login component 7.0.0 through 7.0.5, 2.0.0 through 2.0.10, 1.2.0 all versions may allow a remote and unauthenticated attacker to login into the device via sending specially crafted Access-Challenge response from the Radius server.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
fortinetCNA
7.7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 66%
Affected Products (NVD)
VendorProductVersion
fortinetfortiproxy
1.2.0 ≤
𝑥
≤ 1.2.13
fortinetfortiproxy
2.0.0 ≤
𝑥
≤ 2.0.10
fortinetfortiproxy
7.0.0 ≤
𝑥
≤ 7.0.6
fortinetfortios
6.0.0 ≤
𝑥
≤ 6.0.15
fortinetfortios
6.2.0 ≤
𝑥
≤ 6.2.12
fortinetfortios
6.4.0 ≤
𝑥
≤ 6.4.9
fortinetfortios
7.0.0 ≤
𝑥
≤ 7.0.7
fortinetfortios
7.2.0
fortinetfortios
7.2.1
𝑥
= Vulnerable software versions