CVE-2022-22299

HIGH

FortiADC/FortiProxy <6.3 - Format String

Title source: llm
STIX 2.1

Description

A format string vulnerability [CWE-134] in the command line interpreter of FortiADC version 6.0.0 through 6.0.4, FortiADC version 6.1.0 through 6.1.5, FortiADC version 6.2.0 through 6.2.1, FortiProxy version 1.0.0 through 1.0.7, FortiProxy version 1.1.0 through 1.1.6, FortiProxy version 1.2.0 through 1.2.13, FortiProxy version 2.0.0 through 2.0.7, FortiProxy version 7.0.0 through 7.0.1, FortiOS version 6.0.0 through 6.0.14, FortiOS version 6.2.0 through 6.2.10, FortiOS version 6.4.0 through 6.4.8, FortiOS version 7.0.0 through 7.0.2, FortiMail version 6.4.0 through 6.4.5, FortiMail version 7.0.0 through 7.0.2 may allow an authenticated user to execute unauthorized code or commands via specially crafted command arguments.

Scores

CVSS v3 7.8
EPSS 0.0020
EPSS Percentile 41.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-134
Status published
Products (8)
fortinet/fortiadc 6.2.0
fortinet/fortiadc 6.2.1
fortinet/fortiadc 6.0.0 - 6.0.4
fortinet/fortimail 6.4.0 - 6.4.5
fortinet/fortios 5.0.0 - 5.0.14
fortinet/fortiproxy 7.0.0
fortinet/fortiproxy 7.0.1
fortinet/fortiproxy 1.0.0 - 1.0.7
Published Aug 05, 2022
Tracked Since Feb 18, 2026