Логотип exploitDog
bind:CVE-2022-35843
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-35843

Количество 3

Количество 3

nvd логотип

CVE-2022-35843

около 3 лет назад

An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component 7.2.0, 7.0.0 through 7.0.7, 6.4.0 through 6.4.9, 6.2 all versions, 6.0 all versions and FortiProxy SSH login component 7.0.0 through 7.0.5, 2.0.0 through 2.0.10, 1.2.0 all versions may allow a remote and unauthenticated attacker to login into the device via sending specially crafted Access-Challenge response from the Radius server.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-h7pw-vp92-fggq

около 3 лет назад

An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component 7.2.0, 7.0.0 through 7.0.7, 6.4.0 through 6.4.9, 6.2 all versions, 6.0 all versions and FortiProxy SSH login component 7.0.0 through 7.0.5, 2.0.0 through 2.0.10, 1.2.0 all versions may allow a remote and unauthenticated attacker to login into the device via sending specially crafted Access-Challenge response from the Radius server.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2022-07171

около 3 лет назад

Уязвимость веб-интерфейса управления операционной системы FortiOS, позволяющая нарушителю получить доступ к устройству

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-35843

An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component 7.2.0, 7.0.0 through 7.0.7, 6.4.0 through 6.4.9, 6.2 all versions, 6.0 all versions and FortiProxy SSH login component 7.0.0 through 7.0.5, 2.0.0 through 2.0.10, 1.2.0 all versions may allow a remote and unauthenticated attacker to login into the device via sending specially crafted Access-Challenge response from the Radius server.

CVSS3: 8.1
1%
Низкий
около 3 лет назад
github логотип
GHSA-h7pw-vp92-fggq

An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component 7.2.0, 7.0.0 through 7.0.7, 6.4.0 through 6.4.9, 6.2 all versions, 6.0 all versions and FortiProxy SSH login component 7.0.0 through 7.0.5, 2.0.0 through 2.0.10, 1.2.0 all versions may allow a remote and unauthenticated attacker to login into the device via sending specially crafted Access-Challenge response from the Radius server.

CVSS3: 9.8
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2022-07171

Уязвимость веб-интерфейса управления операционной системы FortiOS, позволяющая нарушителю получить доступ к устройству

CVSS3: 7.3
1%
Низкий
около 3 лет назад

Уязвимостей на страницу