CVE-2022-42475

CRITICAL KEV RANSOMWARE NUCLEI

Fortinet Fortios < 5.0.14 - Buffer Overflow

Title source: rule

Description

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.

Exploits (9)

nomisec WORKING POC 105 stars
by scrt · dos
https://github.com/scrt/cve-2022-42475
nomisec WORKING POC 36 stars
by 0xhaggis · remote
https://github.com/0xhaggis/CVE-2022-42475
nomisec WORKING POC 8 stars
by P4x1s · poc
https://github.com/P4x1s/CVE-2022-42475-RCE-POC
nomisec WORKING POC 7 stars
by Amir-hy · remote
https://github.com/Amir-hy/cve-2022-42475
nomisec SCANNER 1 stars
by bryanster · poc
https://github.com/bryanster/ioc-cve-2022-42475
nomisec WORKING POC 1 stars
by Mustafa1986 · remote
https://github.com/Mustafa1986/cve-2022-42475-Fortinet
nomisec WORKING POC
by ArthurHendrich · poc
https://github.com/ArthurHendrich/CVE-2022-42475-POC
nomisec WORKING POC
by natceil · remote
https://github.com/natceil/cve-2022-42475
vulncheck_xdb WORKING POC
remote
https://github.com/AiK1d/CVE-2022-42475-RCE-POC

Nuclei Templates (1)

Fortinet SSL-VPN - Heap-Based Buffer Overflow
CRITICALby 0xhaggis,pszyszkowski,pussycat0x
Shodan: cpe:"cpe:2.3:o:fortinet:fortios" || http.html:"/remote/login" "xxxxxxxx" || http.favicon.hash:"945408572"
FOFA: body="/remote/login" "xxxxxxxx" || icon_hash="945408572"

Scores

CVSS v3 9.8
EPSS 0.9398
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-12-13
VulnCheck KEV 2022-12-12
InTheWild.io 2022-12-12
ENISA EUVD EUVD-2022-45545
Ransomware Use Confirmed
CWE
CWE-197 CWE-787
Status published
Products (2)
fortinet/fortios 5.0.0 - 5.0.14
fortinet/fortiproxy 1.0.0 - 1.0.7
Published Jan 02, 2023
KEV Added Dec 13, 2022
Tracked Since Feb 18, 2026