ID

VAR-202302-1463


CVE

CVE-2022-27482


TITLE

fortinet's  FortiADC  In  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2023-004477

DESCRIPTION

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiADC version 7.0.0 through 7.0.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.6, 6.0.x, 5.x.x allows attacker to execute arbitrary shell code as `root` via CLI commands. fortinet's FortiADC for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-27482 // JVNDB: JVNDB-2023-004477 // VULHUB: VHN-418122 // VULMON: CVE-2022-27482

AFFECTED PRODUCTS

vendor:fortinetmodel:fortiadcscope:gteversion:6.1.0

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:lteversion:5.1.7

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:gteversion:5.3.0

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:lteversion:5.0.4

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:lteversion:5.2.8

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:gteversion:6.0.0

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:ltversion:6.2.4

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:gteversion:5.4.0

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:eqversion:7.0.0

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:eqversion:7.0.1

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:gteversion:5.0.0

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:gteversion:5.2.0

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:lteversion:5.3.7

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:gteversion:5.1.0

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:lteversion:5.4.5

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:lteversion:6.0.4

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:gteversion:6.2.0

Trust: 1.0

vendor:fortinetmodel:fortiadcscope:lteversion:6.1.6

Trust: 1.0

vendor:フォーティネットmodel:fortiadcscope:eqversion:5.1.0 to 5.1.7

Trust: 0.8

vendor:フォーティネットmodel:fortiadcscope:eqversion: -

Trust: 0.8

vendor:フォーティネットmodel:fortiadcscope:eqversion:6.0.0 to 6.0.4

Trust: 0.8

vendor:フォーティネットmodel:fortiadcscope:eqversion:6.1.0 to 6.1.6

Trust: 0.8

vendor:フォーティネットmodel:fortiadcscope:eqversion:5.0.0 to 5.0.4

Trust: 0.8

vendor:フォーティネットmodel:fortiadcscope:eqversion:7.0.1

Trust: 0.8

vendor:フォーティネットmodel:fortiadcscope:eqversion:5.3.0 to 5.3.7

Trust: 0.8

vendor:フォーティネットmodel:fortiadcscope:eqversion:7.0.0

Trust: 0.8

vendor:フォーティネットmodel:fortiadcscope:eqversion:5.4.0 to 5.4.5

Trust: 0.8

vendor:フォーティネットmodel:fortiadcscope:eqversion:6.2.0 that's all 6.2.4

Trust: 0.8

vendor:フォーティネットmodel:fortiadcscope:eqversion:5.2.0 to 5.2.8

Trust: 0.8

sources: JVNDB: JVNDB-2023-004477 // NVD: CVE-2022-27482

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-27482
value: HIGH

Trust: 1.0

psirt@fortinet.com: CVE-2022-27482
value: HIGH

Trust: 1.0

NVD: CVE-2022-27482
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1449
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-27482
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-27482
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-004477 // CNNVD: CNNVD-202302-1449 // NVD: CVE-2022-27482 // NVD: CVE-2022-27482

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-418122 // JVNDB: JVNDB-2023-004477 // NVD: CVE-2022-27482

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1449

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202302-1449

PATCH

title:Fortinet FortiADC Fixes for operating system command injection vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=226815

Trust: 0.6

sources: CNNVD: CNNVD-202302-1449

EXTERNAL IDS

db:NVDid:CVE-2022-27482

Trust: 3.4

db:JVNDBid:JVNDB-2023-004477

Trust: 0.8

db:CNNVDid:CNNVD-202302-1449

Trust: 0.6

db:VULHUBid:VHN-418122

Trust: 0.1

db:VULMONid:CVE-2022-27482

Trust: 0.1

sources: VULHUB: VHN-418122 // VULMON: CVE-2022-27482 // JVNDB: JVNDB-2023-004477 // CNNVD: CNNVD-202302-1449 // NVD: CVE-2022-27482

REFERENCES

url:https://fortiguard.com/psirt/fg-ir-22-046

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-27482

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-27482/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-418122 // VULMON: CVE-2022-27482 // JVNDB: JVNDB-2023-004477 // CNNVD: CNNVD-202302-1449 // NVD: CVE-2022-27482

SOURCES

db:VULHUBid:VHN-418122
db:VULMONid:CVE-2022-27482
db:JVNDBid:JVNDB-2023-004477
db:CNNVDid:CNNVD-202302-1449
db:NVDid:CVE-2022-27482

LAST UPDATE DATE

2024-08-14T13:52:42.908000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-418122date:2023-02-24T00:00:00
db:VULMONid:CVE-2022-27482date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2023-004477date:2023-10-30T07:36:00
db:CNNVDid:CNNVD-202302-1449date:2023-02-27T00:00:00
db:NVDid:CVE-2022-27482date:2023-11-07T03:45:20.193

SOURCES RELEASE DATE

db:VULHUBid:VHN-418122date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-27482date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2023-004477date:2023-10-30T00:00:00
db:CNNVDid:CNNVD-202302-1449date:2023-02-16T00:00:00
db:NVDid:CVE-2022-27482date:2023-02-16T19:15:12.120