ID

VAR-202206-0516


CVE

CVE-2022-22305


TITLE

Multiple Fortinet Product Trust Management Issue Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202206-753

DESCRIPTION

An improper certificate validation vulnerability [CWE-295] in FortiManager 7.0.1 and below, 6.4.6 and below; FortiAnalyzer 7.0.2 and below, 6.4.7 and below; FortiOS 6.2.x and 6.0.x; FortiSandbox 4.0.x, 3.2.x and 3.1.x may allow a network adjacent and unauthenticated attacker to man-in-the-middle the communication between the listed products and some external peers

Trust: 0.99

sources: NVD: CVE-2022-22305 // VULMON: CVE-2022-22305

AFFECTED PRODUCTS

vendor:fortinetmodel:fortisandboxscope:lteversion:3.0.7

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:6.2.15

Trust: 1.0

vendor:fortinetmodel:fortisandboxscope:eqversion:3.0.1

Trust: 1.0

vendor:fortinetmodel:fortisandboxscope:eqversion:4.0.1

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:6.0.17

Trust: 1.0

vendor:fortinetmodel:fortisandboxscope:gteversion:3.1.0

Trust: 1.0

vendor:fortinetmodel:fortisandboxscope:lteversion:3.2.4

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:lteversion:6.4.6

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:gteversion:6.2.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:6.2.0

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:eqversion:7.0.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:lteversion:6.2.11

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:eqversion:7.0.1

Trust: 1.0

vendor:fortinetmodel:fortisandboxscope:gteversion:3.0.0

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:lteversion:6.0.12

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:lteversion:6.4.7

Trust: 1.0

vendor:fortinetmodel:fortisandboxscope:eqversion:4.0.0

Trust: 1.0

vendor:fortinetmodel:fortisandboxscope:eqversion:4.0.2

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:gteversion:6.0.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:lteversion:6.0.12

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:gteversion:6.4.0

Trust: 1.0

vendor:fortinetmodel:fortisandboxscope:lteversion:3.1.5

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:eqversion:7.0.2

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:eqversion:7.0.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:eqversion:7.0.1

Trust: 1.0

vendor:fortinetmodel:fortisandboxscope:gteversion:3.2.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:5.6.14

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:5.6.10

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:gteversion:6.0.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:6.0.0

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:gteversion:6.2.9

Trust: 1.0

sources: NVD: CVE-2022-22305

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-22305
value: MEDIUM

Trust: 1.0

psirt@fortinet.com: CVE-2022-22305
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202206-753
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-22305
baseSeverity: MEDIUM
baseScore: 4.2
vectorString: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 2.5
version: 3.1

Trust: 1.0

psirt@fortinet.com: CVE-2022-22305
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.5
version: 3.1

Trust: 1.0

sources: CNNVD: CNNVD-202206-753 // NVD: CVE-2022-22305 // NVD: CVE-2022-22305

PROBLEMTYPE DATA

problemtype:CWE-297

Trust: 1.0

problemtype:CWE-295

Trust: 1.0

sources: NVD: CVE-2022-22305

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202206-753

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-202206-753

PATCH

title:Multiple Fortinet Repair measures for product trust management problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=195166

Trust: 0.6

sources: CNNVD: CNNVD-202206-753

EXTERNAL IDS

db:NVDid:CVE-2022-22305

Trust: 1.7

db:CS-HELPid:SB2022060801

Trust: 0.6

db:CNNVDid:CNNVD-202206-753

Trust: 0.6

db:VULMONid:CVE-2022-22305

Trust: 0.1

sources: VULMON: CVE-2022-22305 // CNNVD: CNNVD-202206-753 // NVD: CVE-2022-22305

REFERENCES

url:https://fortiguard.com/psirt/fg-ir-18-292

Trust: 1.1

url:https://vigilance.fr/vulnerability/fortios-fortianalyzer-fortimanager-man-in-the-middle-38526

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022060801

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2022-22305 // CNNVD: CNNVD-202206-753 // NVD: CVE-2022-22305

SOURCES

db:VULMONid:CVE-2022-22305
db:CNNVDid:CNNVD-202206-753
db:NVDid:CVE-2022-22305

LAST UPDATE DATE

2024-08-14T14:02:34.170000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-22305date:2023-09-01T00:00:00
db:CNNVDid:CNNVD-202206-753date:2022-06-08T00:00:00
db:NVDid:CVE-2022-22305date:2023-11-07T03:43:51.810

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-22305date:2023-09-01T00:00:00
db:CNNVDid:CNNVD-202206-753date:2022-06-07T00:00:00
db:NVDid:CVE-2022-22305date:2023-09-01T12:15:08.363