CVE-2022-38381
Published on: Not Yet Published
Last Modified on: 11/04/2022 03:03:00 PM UTC
Certain versions of Fortiadc from Fortinet contain the following vulnerability:
An improper handling of malformed request vulnerability [CWE-228] exists in FortiADC 5.0 all versions, 6.0.0 all versions, 6.1.0 all versions, 6.2.0 through 6.2.3, and 7.0.0 through 7.0.2. This may allow a remote attacker without privileges to bypass some Web Application Firewall (WAF) protection such as the SQL Injection and XSS filters via a malformed HTTP request.
- CVE-2022-38381 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
- Affected Vendor/Software:
Fortinet - Fortinet FortiADC version FortiADC 7.0.2, 7.0.1, 7.0.0, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.1.6, 6.1.5, 6.1.4, 6.1.3, 6.1.2, 6.1.1, 6.1.0, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0, 5.4.5, 5.4.4, 5.4.3, 5.4.2, 5.4.1, 5.4.0, 5.3.7, 5.3.6, 5.3.5, 5.3.4, 5.3.3, 5.3.2, 5.3.1, 5.3.0, 5.2.8, 5.2.7, 5.2.6, 5.2.5, 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.3, 5.1.2, 5.1.1, 5.1.0, 5.0.4, 5.0.3, 5.0.2, 5.0.1, 5.0.0
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
PSIRT Advisories | FortiGuard | fortiguard.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Fortinet | Fortiadc | All | All | All | All |
Application | Fortinet | Fortiadc | All | All | All | All |
Application | Fortinet | Fortiadc | All | All | All | All |
Application | Fortinet | Fortiadc | All | All | All | All |
Application | Fortinet | Fortiadc | All | All | All | All |
Application | Fortinet | Fortiadc | All | All | All | All |
Application | Fortinet | Fortiadc | All | All | All | All |
Application | Fortinet | Fortiadc | All | All | All | All |
Application | Fortinet | Fortiadc | All | All | All | All |
- cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*:
- cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*:
- cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*:
- cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*:
- cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*:
- cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*:
- cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*:
- cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*:
- cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-38381 : An improper handling of malformed request vulnerability [CWE-228] exists in FortiADC 5.0 all versi… twitter.com/i/web/status/1… | 2022-11-02 12:11:55 |
![]() |
CVE-2022-38381 | 2022-11-02 13:38:50 |