ID

VAR-202207-0069


CVE

CVE-2022-27483


TITLE

Fortinet FortiManager  and  FortiAnalyzer  In  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-015700

DESCRIPTION

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiManager version 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.x and 6.0.x and FortiAnalyzer version 7.0.0 through 7.0.3, version 6.4.0 through 6.4.7, 6.2.x and 6.0.x allows attacker to execute arbitrary shell code as `root` user via `diagnose system` CLI commands. Fortinet FortiManager and FortiAnalyzer for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Both Fortinet FortiManager and Fortinet FortiAnalyzer are products of Fortinet. Fortinet FortiManager is a centralized network security management platform. The platform supports centralized management of any number of Fortinet devices, and can group devices into different management domains (ADOMs) to further simplify multi-device security deployment and management. Fortinet FortiAnalyzer is a centralized network security reporting solution. This product is mainly used to collect network log data, and analyze, report, and archive the security events, network traffic, and Web content in the logs through the report suite. An operating system command injection vulnerability exists in Fortinet FortiManager and FortiAnalyzer due to incorrect default permissions on files and folders set by the application. An attacker could exploit this vulnerability to elevate privileges

Trust: 1.8

sources: NVD: CVE-2022-27483 // JVNDB: JVNDB-2022-015700 // VULHUB: VHN-418123 // VULMON: CVE-2022-27483

AFFECTED PRODUCTS

vendor:fortinetmodel:fortimanagerscope:lteversion:6.0.11

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:gteversion:7.0.0

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:gteversion:6.4.0

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:lteversion:6.2.9

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:lteversion:6.4.7

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:lteversion:7.0.3

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:gteversion:6.0.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:gteversion:6.4.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:lteversion:6.2.9

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:lteversion:6.4.7

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:lteversion:7.0.3

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:gteversion:6.2.0

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:lteversion:6.0.11

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:gteversion:6.0.0

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:gteversion:7.0.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:gteversion:6.2.0

Trust: 1.0

vendor:フォーティネットmodel:fortimanagerscope: - version: -

Trust: 0.8

vendor:フォーティネットmodel:fortianalyzerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-015700 // NVD: CVE-2022-27483

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-27483
value: HIGH

Trust: 1.0

psirt@fortinet.com: CVE-2022-27483
value: HIGH

Trust: 1.0

OTHER: JVNDB-2022-015700
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202207-390
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-27483
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 2.0

OTHER: JVNDB-2022-015700
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-015700 // CNNVD: CNNVD-202207-390 // NVD: CVE-2022-27483 // NVD: CVE-2022-27483

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-418123 // JVNDB: JVNDB-2022-015700 // NVD: CVE-2022-27483

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202207-390

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202207-390

PATCH

title:FG-IR-22-049url:https://www.fortiguard.com/psirt/FG-IR-22-049

Trust: 0.8

title:Fortinet FortiManager and FortiAnalyzer Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=201664

Trust: 0.6

sources: JVNDB: JVNDB-2022-015700 // CNNVD: CNNVD-202207-390

EXTERNAL IDS

db:NVDid:CVE-2022-27483

Trust: 3.4

db:JVNDBid:JVNDB-2022-015700

Trust: 0.8

db:CNNVDid:CNNVD-202207-390

Trust: 0.7

db:CS-HELPid:SB2022070535

Trust: 0.6

db:VULHUBid:VHN-418123

Trust: 0.1

db:VULMONid:CVE-2022-27483

Trust: 0.1

sources: VULHUB: VHN-418123 // VULMON: CVE-2022-27483 // JVNDB: JVNDB-2022-015700 // CNNVD: CNNVD-202207-390 // NVD: CVE-2022-27483

REFERENCES

url:https://fortiguard.com/psirt/fg-ir-22-049

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-27483

Trust: 0.8

url:https://vigilance.fr/vulnerability/fortinet-fortianalyzer-fortimanager-code-execution-via-diagnose-system-38736

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-27483/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070535

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-418123 // VULMON: CVE-2022-27483 // JVNDB: JVNDB-2022-015700 // CNNVD: CNNVD-202207-390 // NVD: CVE-2022-27483

SOURCES

db:VULHUBid:VHN-418123
db:VULMONid:CVE-2022-27483
db:JVNDBid:JVNDB-2022-015700
db:CNNVDid:CNNVD-202207-390
db:NVDid:CVE-2022-27483

LAST UPDATE DATE

2024-08-14T13:22:03.856000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-418123date:2022-07-27T00:00:00
db:VULMONid:CVE-2022-27483date:2022-07-19T00:00:00
db:JVNDBid:JVNDB-2022-015700date:2023-09-28T07:53:00
db:CNNVDid:CNNVD-202207-390date:2022-08-10T00:00:00
db:NVDid:CVE-2022-27483date:2022-07-27T07:18:54.910

SOURCES RELEASE DATE

db:VULHUBid:VHN-418123date:2022-07-19T00:00:00
db:VULMONid:CVE-2022-27483date:2022-07-19T00:00:00
db:JVNDBid:JVNDB-2022-015700date:2023-09-28T00:00:00
db:CNNVDid:CNNVD-202207-390date:2022-07-05T00:00:00
db:NVDid:CVE-2022-27483date:2022-07-19T14:15:08.500