A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as `root` via `execute` CLI commands.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-22-047 |
![]() ![]() |
History
Thu, 22 Aug 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortiddos Fortinet fortiddos-f |
|
CPEs | cpe:2.3:a:fortinet:fortiddos-f:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiddos-f:6.5.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiddos:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiddos:5.7.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortiddos Fortinet fortiddos-f |
Wed, 14 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 13 Aug 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as `root` via `execute` CLI commands. | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-14T14:41:14.087Z
Reserved: 2022-03-21T16:03:48.575Z
Link: CVE-2022-27486

Updated: 2024-08-14T14:41:08.634Z

Status : Analyzed
Published: 2024-08-13T16:15:07.693
Modified: 2024-08-22T14:29:44.627
Link: CVE-2022-27486

No data.