Vulnerabilites related to Fortinet - FortiAP-U
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-19-209 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-19-209 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "B49D7931-B85F-43CF-A856-CAC551B94484", "versionEndIncluding": "6.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "44FA41F6-6B1E-4296-B221-0AA4AACCBE5D", "versionEndIncluding": "6.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D024C9D-DB39-408A-B015-3DCC40512C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "79A8F245-922D-42AE-9DF1-A9292A1D97C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB24E73E-8279-44F3-9DA2-76F5B0E5D7D4", "versionEndIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D8279FB-CB12-4C59-901A-D96CE162E855", "versionEndIncluding": "6.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "63F06A65-ADF7-4284-A00C-B5E862441722", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FE3508FA-E206-4377-AE36-DDD6691EA3A7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n de comandos de sistema en el FortiAP-S/W2 versiones 6.2.1, 6.2.0, 6.0.5 y por debajo, FortiAP versiones 6.0.5 y por debajo y FortiAP-U versiones por debajo de 6.0.0, bajo la consola de administraci\u00f3n de la CLI puede permitir a administradores no autorizados ejecutar comandos arbitrarios a nivel de sistema por medio de comandos ifconfig especialmente dise\u00f1ados ." } ], "id": "CVE-2019-15708", "lastModified": "2024-11-21T04:29:17.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-15T23:15:11.327", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-19-209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-19-209" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-21-163 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-21-163 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
fortinet | fortiap | * | |
fortinet | fortiap | * | |
fortinet | fortiap | * | |
fortinet | fortiap | 7.2.0 | |
fortinet | fortiap-s | * | |
fortinet | fortiap-s | * | |
fortinet | fortiap-s | * | |
fortinet | fortiap-u | * | |
fortinet | fortiap-u | * | |
fortinet | fortiap-u | * | |
fortinet | fortiap-w2 | * | |
fortinet | fortiap-w2 | * | |
fortinet | fortiap-w2 | * | |
fortinet | fortiap-w2 | * | |
fortinet | fortiap-w2 | 7.2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C2EBA1B-2FFE-4B09-AF81-570161EB6BF3", "versionEndIncluding": "6.0.6", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEF13641-3F15-4345-B777-932C827B6EBD", "versionEndExcluding": "6.4.8", "versionStartIncluding": "6.4.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "63A8CD15-B81E-4E36-943D-FE2D822C30D5", "versionEndExcluding": "7.0.4", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD3A3A70-3B13-40A4-893C-7397BB28F952", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "F80D4C66-4D1B-4759-844F-9BB508E576EB", "versionEndIncluding": "6.0.6", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "95385DA4-11F6-487E-8D46-9DB888EE85CF", "versionEndIncluding": "6.2.6", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDFD96E1-C7EF-4AF1-8E3F-1BB8EA48A401", "versionEndExcluding": "6.4.8", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BEF86D0-7255-4054-8AA7-4AA411C5FE32", "versionEndIncluding": "5.4.6", "versionStartIncluding": "5.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "607B4B16-A019-4DB5-A3D5-845B3C81E2CA", "versionEndIncluding": "6.0.4", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "F681257D-8CBE-4B23-9B38-7491876EB68C", "versionEndExcluding": "6.2.4", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "F71CA9D4-236C-4D96-BBA5-24A880BB347D", "versionEndIncluding": "6.0.6", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "96495773-F770-4F9C-B760-CD03CE1FDC6C", "versionEndIncluding": "6.2.6", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA6B411-9438-487B-891E-079C8FB7ECD0", "versionEndExcluding": "6.4.8", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "76F6BD2D-AC3B-4863-A536-D30D87307132", "versionEndExcluding": "7.0.4", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "21B77DBC-6B9F-4EF0-847C-D2BDE123DDE4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements [CWE-89] used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0, FortiAP-S 6.0.0 through 6.4.7, FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0 and FortiAP-U 5.4.0 through 6.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands." }, { "lang": "es", "value": "Una neutralizaci\u00f3n inapropiada de elementos especiales [CWE-89] usados en una vulnerabilidad de comandos del Sistema Operativo [CWE-78] en el int\u00e9rprete de l\u00ednea de comandos de FortiAP versiones 6.0.0 hasta 6.4.7, 7.0.0 hasta 7.0.3, 7.2.0, FortiAP-S versiones 6.0.0 hasta 6.4. 7, FortiAP-W2 versiones 6.0.0 hasta 6.4.7, 7.0.0 hasta 7.0.3, 7.2.0 y FortiAP-U versiones 5.4.0 hasta 6.2.3, pueden permitir a un atacante autenticado ejecutar comandos no autorizados por medio de argumentos espec\u00edficamente dise\u00f1ados para comandos existentes.\n" } ], "id": "CVE-2022-29058", "lastModified": "2024-11-21T06:58:25.527", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@fortinet.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-06T18:15:13.053", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-21-163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-21-163" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-19-298 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-19-298 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "20474B39-661E-4425-8007-2C2597382AFD", "versionEndIncluding": "6.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "070E514F-CAAA-41B7-A2F3-B1413523AFD9", "versionEndIncluding": "6.2.2", "versionStartIncluding": "6.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fortinet:fortiap-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "08EA632B-0568-4EDB-81E1-E2772389E106", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "D117E145-EB84-4BE5-B4F6-6262F8BDE56F", "versionEndIncluding": "6.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC5D6562-A598-42AC-AFD6-4C6DF215479A", "versionEndIncluding": "6.2.2", "versionStartIncluding": "6.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:fortinet:fortiap-w2:-:*:*:*:*:*:*:*", "matchCriteriaId": "94DC1717-87D3-4BCA-8919-431D30D307D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AD25BC2-1FDE-45EB-8887-6FC680614B84", "versionEndIncluding": "6.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fortinet:fortiap-u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8197EC87-A2AE-4D42-90DD-96A3A7B26E76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper input validation in FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below CLI admin console may allow unauthorized administrators to overwrite system files via specially crafted tcpdump commands in the CLI." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en FortiAP-S/W2 versiones 6.2.0 hasta 6.2.2, versiones 6.0.5 y por debajo, FortiAP-U versiones 6.0.1 y por debajo, la consola de administraci\u00f3n de la CLI puede permitir a administradores no autorizados sobrescribir los archivos de sistema por medio comandos tcpdump especialmente dise\u00f1ados en la CLI." } ], "id": "CVE-2019-15709", "lastModified": "2024-11-21T04:29:18.117", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-01T19:15:09.800", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-19-298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-19-298" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-120 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-120 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5BE67AF-5DC9-4942-832F-03BEC88CD2B9", "versionEndExcluding": "7.0.6", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "41C213D0-356F-425E-A124-5B72A3AEE54D", "versionEndExcluding": "7.2.2", "versionStartIncluding": "7.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-c:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E770699-3997-4E61-A4AD-68D102FCA4B3", "versionEndExcluding": "5.4.5", "versionStartIncluding": "5.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D44BE0A-B671-454C-8B6A-56AA4BA70E60", "versionEndExcluding": "6.2.6", "versionStartIncluding": "5.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "743763F2-D4DE-4E9D-B112-7CA27C61A423", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "87E0B46B-B76D-4D27-AD6F-E929E362B6E1", "versionEndIncluding": "7.0.1", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "B602BCD9-47CF-443C-A759-0B8379777768", "versionEndExcluding": "7.0.6", "versionStartIncluding": "7.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9D26699-16AD-4752-A088-72CF117C98D0", "versionEndExcluding": "7.2.2", "versionStartIncluding": "7.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments." }, { "lang": "es", "value": "Una vulnerabilidad de filtrado incompleto de una o m\u00e1s instancias de elementos especiales [CWE-792] en el int\u00e9rprete de l\u00ednea de comando de FortiAP-W2 7.2.0 a 7.2.1, 7.0.3 a 7.0.5, 7.0.0 a 7.0.1, 6.4 todas las versiones, 6.2 todas las versiones, 6.0 todas las versiones; FortiAP-C 5.4.0 a 5.4.4, 5.2 todas las versiones; FortiAP 7.2.0 a 7.2.1, 7.0.0 a 7.0.5, 6.4 todas las versiones, 6.0 todas las versiones; FortiAP-U 7.0.0, 6.2.0 a 6.2.5, 6.0 todas las versiones, 5.4 todas las versiones puede permitir que un atacante autenticado lea archivos arbitrarios mediante argumentos de comando especialmente manipulados." } ], "id": "CVE-2023-25608", "lastModified": "2024-11-21T07:49:49.420", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "psirt@fortinet.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-13T13:15:08.040", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-22-120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-22-120" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-792" } ], "source": "psirt@fortinet.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-23-123 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-23-123 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BEF86D0-7255-4054-8AA7-4AA411C5FE32", "versionEndIncluding": "5.4.6", "versionStartIncluding": "5.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "607B4B16-A019-4DB5-A3D5-845B3C81E2CA", "versionEndIncluding": "6.0.4", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "D94D840D-28B9-45AB-952C-951710AA63CD", "versionEndIncluding": "6.2.5", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "743763F2-D4DE-4E9D-B112-7CA27C61A423", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to list and delete arbitrary files and directory via specially crafted command arguments." }, { "lang": "es", "value": "Un filtrado incompleto de una o m\u00e1s instancias de vulnerabilidad de elementos especiales [CWE-792] en el int\u00e9rprete de l\u00ednea de comando de FortiAP-U 7.0.0, 6.2.0 a 6.2.5, 6.0 todas las versiones, 5.4 todas las versiones puede permitir un atacante autenticado para enumerar y eliminar archivos y directorios arbitrarios mediante argumentos de comandos especialmente manipulados." } ], "id": "CVE-2023-36634", "lastModified": "2024-11-21T08:10:08.287", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "psirt@fortinet.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-13T13:15:08.883", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-23-123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-23-123" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-73" } ], "source": "psirt@fortinet.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-109 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-109 | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "607B4B16-A019-4DB5-A3D5-845B3C81E2CA", "versionEndIncluding": "6.0.4", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "F971AAAE-240B-4838-ADD9-115C5A9CE73E", "versionEndIncluding": "6.2.3", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FFF26DC2-601F-4702-BD1E-81314AAEA2BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3D612BAA-9A55-4C76-85F4-B7B3B8E7C310", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "97B73C52-F254-4AA6-8E03-10DEF8C0D183", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "C0939528-4006-4225-A81C-08D75983AB20", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:5.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "9BF62847-C301-42F3-8BAF-9B30CD758055", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability [CWE-22] in FortiAP-U CLI 6.2.0 through 6.2.3, 6.0.0 through 6.0.4, 5.4.0 through 5.4.6 may allow an admin user to delete and access unauthorized files and data via specifically crafted CLI commands." }, { "lang": "es", "value": "Una vulnerabilidad de salto de ruta [CWE-22] en FortiAP-U CLI versiones 6.2.0 hasta 6.2.3, 6.0.0 hasta 6.0.4, 5.4.0 hasta 5.4.6, puede permitir a un usuario administrador eliminar y acceder a archivos y datos no autorizados por medio de comandos CLI especialmente dise\u00f1ados." } ], "id": "CVE-2022-30301", "lastModified": "2024-11-21T07:02:31.860", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@fortinet.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-19T14:15:08.770", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-22-109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-22-109" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2019-15708
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://fortiguard.com/psirt/FG-IR-19-209 | x_refsource_CONFIRM |
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Fortinet | Fortinet FortiAP-S/W2 |
Version: 6.2.1 Version: 6.2.0 Version: 6.0.5 and below |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:56:22.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-19-209" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-15708", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-24T20:03:38.903696Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T14:25:55.858Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Fortinet FortiAP-S/W2", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "6.2.1" }, { "status": "affected", "version": "6.2.0" }, { "status": "affected", "version": "6.0.5 and below" } ] }, { "product": "Fortinet FortiAP-U", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "6.0.5 and below" } ] }, { "product": "Fortinet FortiAP", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "below 6.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Execute unauthorized code or commands", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-15T22:27:49", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://fortiguard.com/psirt/FG-IR-19-209" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@fortinet.com", "ID": "CVE-2019-15708", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fortinet FortiAP-S/W2", "version": { "version_data": [ { "version_value": "6.2.1" }, { "version_value": "6.2.0" }, { "version_value": "6.0.5 and below" } ] } }, { "product_name": "Fortinet FortiAP-U", "version": { "version_data": [ { "version_value": "6.0.5 and below" } ] } }, { "product_name": "Fortinet FortiAP", "version": { "version_data": [ { "version_value": "below 6.0.0" } ] } } ] }, "vendor_name": "Fortinet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Execute unauthorized code or commands" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/psirt/FG-IR-19-209", "refsource": "CONFIRM", "url": "https://fortiguard.com/psirt/FG-IR-19-209" } ] } } } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2019-15708", "datePublished": "2020-03-15T22:27:49", "dateReserved": "2019-08-27T00:00:00", "dateUpdated": "2024-10-25T14:25:55.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15709
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://fortiguard.com/psirt/FG-IR-19-298 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Fortinet FortiAP-S/W2, FortiAP-U |
Version: FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:56:22.365Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-19-298" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-15709", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T13:59:17.609971Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T14:01:51.126Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Fortinet FortiAP-S/W2, FortiAP-U", "vendor": "n/a", "versions": [ { "status": "affected", "version": "FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper input validation in FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below CLI admin console may allow unauthorized administrators to overwrite system files via specially crafted tcpdump commands in the CLI." } ], "problemTypes": [ { "descriptions": [ { "description": "Execute unauthorized code or commands", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-01T18:37:21", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://fortiguard.com/psirt/FG-IR-19-298" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@fortinet.com", "ID": "CVE-2019-15709", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fortinet FortiAP-S/W2, FortiAP-U", "version": { "version_data": [ { "version_value": "FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper input validation in FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below CLI admin console may allow unauthorized administrators to overwrite system files via specially crafted tcpdump commands in the CLI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Execute unauthorized code or commands" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/psirt/FG-IR-19-298", "refsource": "MISC", "url": "https://fortiguard.com/psirt/FG-IR-19-298" } ] } } } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2019-15709", "datePublished": "2020-06-01T18:37:21", "dateReserved": "2019-08-27T00:00:00", "dateUpdated": "2024-10-25T14:01:51.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29058
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://fortiguard.com/psirt/FG-IR-21-163 | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Fortinet | Fortinet FortiAP, FortiAP-S, FortiAP-W2, FortiAP-U |
Version: FortiAP-U 5.4.0 through 6.2.3; FortiAP-S 6.0.0 through 6.4.7; FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0; FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:10:59.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-21-163" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-29058", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T14:12:24.249054Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T13:30:21.436Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Fortinet FortiAP, FortiAP-S, FortiAP-W2, FortiAP-U", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "FortiAP-U 5.4.0 through 6.2.3; FortiAP-S 6.0.0 through 6.4.7; FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0; FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0." } ] } ], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements [CWE-89] used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0, FortiAP-S 6.0.0 through 6.4.7, FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0 and FortiAP-U 5.4.0 through 6.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitCodeMaturity": "FUNCTIONAL", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "remediationLevel": "UNAVAILABLE", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 7.6, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Execute unauthorized code or commands", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-06T15:10:15", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://fortiguard.com/psirt/FG-IR-21-163" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@fortinet.com", "ID": "CVE-2022-29058", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fortinet FortiAP, FortiAP-S, FortiAP-W2, FortiAP-U", "version": { "version_data": [ { "version_value": "FortiAP-U 5.4.0 through 6.2.3; FortiAP-S 6.0.0 through 6.4.7; FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0; FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0." } ] } } ] }, "vendor_name": "Fortinet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper neutralization of special elements [CWE-89] used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0, FortiAP-S 6.0.0 through 6.4.7, FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0 and FortiAP-U 5.4.0 through 6.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.6, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "userInteraction": "None", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Execute unauthorized code or commands" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/psirt/FG-IR-21-163", "refsource": "CONFIRM", "url": "https://fortiguard.com/psirt/FG-IR-21-163" } ] } } } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2022-29058", "datePublished": "2022-09-06T15:10:15", "dateReserved": "2022-04-11T00:00:00", "dateUpdated": "2024-10-25T13:30:21.436Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36634
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:52:53.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://fortiguard.com/psirt/FG-IR-23-123", "tags": [ "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-23-123" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36634", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T19:45:17.934399Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T19:59:21.111Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FortiAP-U", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "7.0.0" }, { "lessThanOrEqual": "6.2.5", "status": "affected", "version": "6.2.0", "versionType": "semver" }, { "lessThanOrEqual": "6.0.4", "status": "affected", "version": "6.0.0", "versionType": "semver" }, { "lessThanOrEqual": "5.4.6", "status": "affected", "version": "5.4.3", "versionType": "semver" }, { "status": "affected", "version": "5.4.0" } ] } ], "descriptions": [ { "lang": "en", "value": "An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to list and delete arbitrary files and directory via specially crafted command arguments." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:X/RC:R", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-73", "description": "Improper access control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-13T12:29:31.577Z", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "name": "https://fortiguard.com/psirt/FG-IR-23-123", "url": "https://fortiguard.com/psirt/FG-IR-23-123" } ], "solutions": [ { "lang": "en", "value": "Please upgrade to FortiAP-U version 7.0.1 or above Please upgrade to FortiAP-U version 6.2.6 or above " } ] } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2023-36634", "datePublished": "2023-09-13T12:29:31.577Z", "dateReserved": "2023-06-25T18:03:39.226Z", "dateUpdated": "2024-09-24T19:59:21.111Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25608
Vulnerability from cvelistv5
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Fortinet | FortiAP-W2 |
Version: 7.2.0 ≤ 7.2.1 Version: 7.0.3 ≤ 7.0.5 Version: 7.0.0 ≤ 7.0.1 Version: 6.4.0 ≤ 6.4.9 Version: 6.2.0 ≤ 6.2.6 Version: 6.0.0 ≤ 6.0.6 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:25:19.383Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://fortiguard.com/psirt/FG-IR-22-120", "tags": [ "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-22-120" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-25608", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T19:45:36.151614Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T20:00:10.726Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FortiAP-W2", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "7.2.1", "status": "affected", "version": "7.2.0", "versionType": "semver" }, { "lessThanOrEqual": "7.0.5", "status": "affected", "version": "7.0.3", "versionType": "semver" }, { "lessThanOrEqual": "7.0.1", "status": "affected", "version": "7.0.0", "versionType": "semver" }, { "lessThanOrEqual": "6.4.9", "status": "affected", "version": "6.4.0", "versionType": "semver" }, { "lessThanOrEqual": "6.2.6", "status": "affected", "version": "6.2.0", "versionType": "semver" }, { "lessThanOrEqual": "6.0.6", "status": "affected", "version": "6.0.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FortiAP-C", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "5.4.4", "status": "affected", "version": "5.4.0", "versionType": "semver" }, { "lessThanOrEqual": "5.2.1", "status": "affected", "version": "5.2.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FortiAP", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "7.2.1", "status": "affected", "version": "7.2.0", "versionType": "semver" }, { "lessThanOrEqual": "7.0.5", "status": "affected", "version": "7.0.0", "versionType": "semver" }, { "lessThanOrEqual": "6.4.9", "status": "affected", "version": "6.4.3", "versionType": "semver" }, { "lessThanOrEqual": "6.0.6", "status": "affected", "version": "6.0.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FortiAP-U", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "7.0.0" }, { "lessThanOrEqual": "6.2.5", "status": "affected", "version": "6.2.0", "versionType": "semver" }, { "lessThanOrEqual": "6.0.4", "status": "affected", "version": "6.0.0", "versionType": "semver" }, { "lessThanOrEqual": "5.4.6", "status": "affected", "version": "5.4.3", "versionType": "semver" }, { "status": "affected", "version": "5.4.0" } ] }, { "defaultStatus": "unaffected", "product": "FortiAP-S", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "6.4.9", "status": "affected", "version": "6.4.0", "versionType": "semver" }, { "lessThanOrEqual": "6.2.6", "status": "affected", "version": "6.2.0", "versionType": "semver" }, { "lessThanOrEqual": "6.0.6", "status": "affected", "version": "6.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-792", "description": "Information disclosure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-13T12:28:51.497Z", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "name": "https://fortiguard.com/psirt/FG-IR-22-120", "url": "https://fortiguard.com/psirt/FG-IR-22-120" } ], "solutions": [ { "lang": "en", "value": "Please upgrade to FortiAP-W2 version 7.2.2 or above Please upgrade to FortiAP-W2 version 7.0.6 or above Please upgrade to FortiAP-C version 5.4.5 or above Please upgrade to FortiAP version 7.2.2 or above Please upgrade to FortiAP version 7.0.6 or above Please upgrade to FortiAP-U version 7.0.1 or above Please upgrade to FortiAP-U version 6.2.6 or above " } ] } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2023-25608", "datePublished": "2023-09-13T12:28:51.497Z", "dateReserved": "2023-02-08T13:42:03.367Z", "dateUpdated": "2024-09-24T20:00:10.726Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30301
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://fortiguard.com/psirt/FG-IR-22-109 | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Fortinet | Fortinet FortiAP-U |
Version: FortiAP-U 6.2.0 through 6.2.3, 6.0.0 through 6.0.4, 5.4.0 through 5.4.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:48:35.851Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-22-109" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-30301", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T14:12:31.327753Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T13:31:12.470Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Fortinet FortiAP-U", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "FortiAP-U 6.2.0 through 6.2.3, 6.0.0 through 6.0.4, 5.4.0 through 5.4.6" } ] } ], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability [CWE-22] in FortiAP-U CLI 6.2.0 through 6.2.3, 6.0.0 through 6.0.4, 5.4.0 through 5.4.6 may allow an admin user to delete and access unauthorized files and data via specifically crafted CLI commands." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitCodeMaturity": "PROOF_OF_CONCEPT", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "remediationLevel": "UNAVAILABLE", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 7.4, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Execute unauthorized code or commands", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-19T13:55:19", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://fortiguard.com/psirt/FG-IR-22-109" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@fortinet.com", "ID": "CVE-2022-30301", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fortinet FortiAP-U", "version": { "version_data": [ { "version_value": "FortiAP-U 6.2.0 through 6.2.3, 6.0.0 through 6.0.4, 5.4.0 through 5.4.6" } ] } } ] }, "vendor_name": "Fortinet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A path traversal vulnerability [CWE-22] in FortiAP-U CLI 6.2.0 through 6.2.3, 6.0.0 through 6.0.4, 5.4.0 through 5.4.6 may allow an admin user to delete and access unauthorized files and data via specifically crafted CLI commands." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.4, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "userInteraction": "None", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Execute unauthorized code or commands" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/psirt/FG-IR-22-109", "refsource": "CONFIRM", "url": "https://fortiguard.com/psirt/FG-IR-22-109" } ] } } } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2022-30301", "datePublished": "2022-07-18T16:35:46", "dateReserved": "2022-05-06T00:00:00", "dateUpdated": "2024-10-25T13:31:12.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202206-0609
Vulnerability from variot
A path traversal vulnerability [CWE-22] in FortiAP-U CLI 6.2.0 through 6.2.3, 6.0.0 through 6.0.4, 5.4.0 through 5.4.6 may allow an admin user to delete and access unauthorized files and data via specifically crafted CLI commands. FortiAP-U CLI Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiAP-U is a controller used to manage wireless access point devices from Fortinet. A local attacker could exploit this vulnerability to access and delete otherwise inaccessible files on the system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0609", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fortiap-u", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.0" }, { "model": "fortiap-u", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": "5.4.6" }, { "model": "fortiap-u", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "6.2.0" }, { "model": "fortiap-u", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.4" }, { "model": "fortiap-u", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": "5.4.4" }, { "model": "fortiap-u", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "6.2.3" }, { "model": "fortiap-u", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": "5.4.5" }, { "model": "fortiap-u", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": "5.4.3" }, { "model": "fortiap-u", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": "5.4.0" }, { "model": "fortiap-u", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "6.0.0 from 6.0.4" }, { "model": "fortiap-u", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": null }, { "model": "fortiap-u", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "6.2.0 to 6.2.3" }, { "model": "fortiap-u", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "5.4.0 to 5.4.6" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-015694" }, { "db": "NVD", "id": "CVE-2022-30301" } ] }, "cve": "CVE-2022-30301", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2022-30301", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "psirt@fortinet.com", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-30301", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-30301", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-30301", "trust": 1.0, "value": "MEDIUM" }, { "author": "psirt@fortinet.com", "id": "CVE-2022-30301", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-30301", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202206-771", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-015694" }, { "db": "CNNVD", "id": "CNNVD-202206-771" }, { "db": "NVD", "id": "CVE-2022-30301" }, { "db": "NVD", "id": "CVE-2022-30301" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A path traversal vulnerability [CWE-22] in FortiAP-U CLI 6.2.0 through 6.2.3, 6.0.0 through 6.0.4, 5.4.0 through 5.4.6 may allow an admin user to delete and access unauthorized files and data via specifically crafted CLI commands. FortiAP-U CLI Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiAP-U is a controller used to manage wireless access point devices from Fortinet. A local attacker could exploit this vulnerability to access and delete otherwise inaccessible files on the system", "sources": [ { "db": "NVD", "id": "CVE-2022-30301" }, { "db": "JVNDB", "id": "JVNDB-2022-015694" }, { "db": "VULHUB", "id": "VHN-421795" }, { "db": "VULMON", "id": "CVE-2022-30301" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-30301", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-015694", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-771", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022060802", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-421795", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-30301", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421795" }, { "db": "VULMON", "id": "CVE-2022-30301" }, { "db": "JVNDB", "id": "JVNDB-2022-015694" }, { "db": "CNNVD", "id": "CNNVD-202206-771" }, { "db": "NVD", "id": "CVE-2022-30301" } ] }, "id": "VAR-202206-0609", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421795" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:26.585000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "FG-IR-22-109", "trust": 0.8, "url": "https://www.fortiguard.com/psirt/FG-IR-22-109" }, { "title": "Fortinet FortiAP-U Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=195176" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-015694" }, { "db": "CNNVD", "id": "CNNVD-202206-771" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421795" }, { "db": "JVNDB", "id": "JVNDB-2022-015694" }, { "db": "NVD", "id": "CVE-2022-30301" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://fortiguard.com/psirt/fg-ir-22-109" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-30301" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022060802" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-30301/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421795" }, { "db": "VULMON", "id": "CVE-2022-30301" }, { "db": "JVNDB", "id": "JVNDB-2022-015694" }, { "db": "CNNVD", "id": "CNNVD-202206-771" }, { "db": "NVD", "id": "CVE-2022-30301" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421795" }, { "db": "VULMON", "id": "CVE-2022-30301" }, { "db": "JVNDB", "id": "JVNDB-2022-015694" }, { "db": "CNNVD", "id": "CNNVD-202206-771" }, { "db": "NVD", "id": "CVE-2022-30301" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-421795" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-30301" }, { "date": "2023-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-015694" }, { "date": "2022-06-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-771" }, { "date": "2022-07-19T14:15:08.770000", "db": "NVD", "id": "CVE-2022-30301" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-27T00:00:00", "db": "VULHUB", "id": "VHN-421795" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-30301" }, { "date": "2023-09-28T07:45:00", "db": "JVNDB", "id": "JVNDB-2022-015694" }, { "date": "2022-07-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-771" }, { "date": "2022-07-27T12:04:06.710000", "db": "NVD", "id": "CVE-2022-30301" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-771" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FortiAP-U\u00a0CLI\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-015694" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-771" } ], "trust": 0.6 } }
var-202209-0418
Vulnerability from variot
An improper neutralization of special elements [CWE-89] used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0, FortiAP-S 6.0.0 through 6.4.7, FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0 and FortiAP-U 5.4.0 through 6.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands. FortiAP , FortiAP-S , FortiAP-U Fortinet products such as SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0418", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fortiap-w2", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "6.4.0" }, { "model": "fortiap-w2", "scope": "lt", "trust": 1.0, "vendor": "fortinet", "version": "7.0.4" }, { "model": "fortiap-u", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "5.4.0" }, { "model": "fortiap-u", "scope": "lt", "trust": 1.0, "vendor": "fortinet", "version": "6.2.4" }, { "model": "fortiap-s", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.0" }, { "model": "fortiap-s", "scope": "lt", "trust": 1.0, "vendor": "fortinet", "version": "6.4.8" }, { "model": "fortiap-u", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "6.2.0" }, { "model": "fortiap", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.0" }, { "model": "fortiap", "scope": "lt", "trust": 1.0, "vendor": "fortinet", "version": "6.4.8" }, { "model": "fortiap-s", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "6.2.6" }, { "model": "fortiap-u", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.4" }, { "model": "fortiap-w2", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.0" }, { "model": "fortiap", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "6.4.3" }, { "model": "fortiap", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.6" }, { "model": "fortiap-w2", "scope": "lt", "trust": 1.0, "vendor": "fortinet", "version": "6.4.8" }, { "model": "fortiap-u", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.0" }, { "model": "fortiap", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": "7.2.0" }, { "model": "fortiap-w2", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": "7.2.0" }, { "model": "fortiap-s", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "6.2.0" }, { "model": "fortiap", "scope": "lt", "trust": 1.0, "vendor": "fortinet", "version": "7.0.4" }, { "model": "fortiap-w2", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.6" }, { "model": "fortiap-w2", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "6.2.0" }, { "model": "fortiap-u", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "5.4.6" }, { "model": "fortiap", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "7.0.0" }, { "model": "fortiap-s", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "6.4.0" }, { "model": "fortiap-w2", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "7.0.0" }, { "model": "fortiap-w2", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "6.2.6" }, { "model": "fortiap-s", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.6" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "-u 6.2.0 that\u0027s all 6.2.4" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "-w2 7.0.0 that\u0027s all 7.0.4" }, { "model": "fortiap-w2", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "6.4.0 that\u0027s all 6.4.8" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "-w2 6.4.0 that\u0027s all 6.4.8" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "-u 5.4.0 to 5.4.6" }, { "model": "fortiap-w2", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "7.0.0 that\u0027s all 7.0.4" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "7.2.0" }, { "model": "fortiap-w2", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "6.0.0 to 6.0.6" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "-w2 6.0.0 to 6.0.6" }, { "model": "fortiap-s", "scope": null, "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": null }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "-w2 7.2.0" }, { "model": "fortiap-u", "scope": null, "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": null }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "-u 6.0.0 to 6.0.4" }, { "model": "fortiap-w2", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "7.2.0" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "-s 6.4.0 that\u0027s all 6.4.8" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "-w2 6.2.0 to 6.2.6" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "6.4.3 that\u0027s all 6.4.8" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "-s 6.0.0 to 6.0.6" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "-s 6.2.0 to 6.2.6" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "7.0.0 that\u0027s all 7.0.4" }, { "model": "fortiap-w2", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "6.2.0 to 6.2.6" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "6.0.0 to 6.0.6" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019305" }, { "db": "NVD", "id": "CVE-2022-29058" } ] }, "cve": "CVE-2022-29058", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-29058", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-29058", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29058", "trust": 1.0, "value": "HIGH" }, { "author": "psirt@fortinet.com", "id": "CVE-2022-29058", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-29058", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-322", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019305" }, { "db": "CNNVD", "id": "CNNVD-202209-322" }, { "db": "NVD", "id": "CVE-2022-29058" }, { "db": "NVD", "id": "CVE-2022-29058" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An improper neutralization of special elements [CWE-89] used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0, FortiAP-S 6.0.0 through 6.4.7, FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0 and FortiAP-U 5.4.0 through 6.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands. FortiAP , FortiAP-S , FortiAP-U Fortinet products such as SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-29058" }, { "db": "JVNDB", "id": "JVNDB-2022-019305" }, { "db": "VULHUB", "id": "VHN-420592" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29058", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-019305", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-322", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-420592", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-420592" }, { "db": "JVNDB", "id": "JVNDB-2022-019305" }, { "db": "CNNVD", "id": "CNNVD-202209-322" }, { "db": "NVD", "id": "CVE-2022-29058" } ] }, "id": "VAR-202209-0418", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-420592" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:12.314000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "FG-IR-21-163", "trust": 0.8, "url": "https://fortiguard.com/psirt/FG-IR-21-163" }, { "title": "Multiple Fortinet product SQL Repair measures for injecting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=207208" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019305" }, { "db": "CNNVD", "id": "CNNVD-202209-322" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-89", "trust": 1.1 }, { "problemtype": "SQL injection (CWE-89) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-420592" }, { "db": "JVNDB", "id": "JVNDB-2022-019305" }, { "db": "NVD", "id": "CVE-2022-29058" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://fortiguard.com/psirt/fg-ir-21-163" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29058" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29058/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-420592" }, { "db": "JVNDB", "id": "JVNDB-2022-019305" }, { "db": "CNNVD", "id": "CNNVD-202209-322" }, { "db": "NVD", "id": "CVE-2022-29058" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-420592" }, { "db": "JVNDB", "id": "JVNDB-2022-019305" }, { "db": "CNNVD", "id": "CNNVD-202209-322" }, { "db": "NVD", "id": "CVE-2022-29058" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-06T00:00:00", "db": "VULHUB", "id": "VHN-420592" }, { "date": "2023-10-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-019305" }, { "date": "2022-09-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-322" }, { "date": "2022-09-06T18:15:13.053000", "db": "NVD", "id": "CVE-2022-29058" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-09T00:00:00", "db": "VULHUB", "id": "VHN-420592" }, { "date": "2023-10-25T05:28:00", "db": "JVNDB", "id": "JVNDB-2022-019305" }, { "date": "2022-09-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-322" }, { "date": "2022-09-09T15:33:48.237000", "db": "NVD", "id": "CVE-2022-29058" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-322" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "across multiple Fortinet products. \u00a0SQL\u00a0 Injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019305" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SQL injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-322" } ], "trust": 0.6 } }
var-202003-0930
Vulnerability from variot
A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands. plural FortiAP The product has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. An operating system command injection vulnerability exists in Fortinet FortiAP. The following products and versions are affected: FortiAP-S/W2 versions prior to 6.2.2, versions prior to 6.0.6; FortiAP versions prior to 6.0.5; FortiAP-U versions prior to 6.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-0930", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fortiap-s", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "6.2.0" }, { "model": "fortiap-s", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "6.2.1" }, { "model": "fortiap-w2", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "6.2.0" }, { "model": "fortiap-w2", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "6.2.1" }, { "model": "fortiap-u", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.0" }, { "model": "fortiap-w2", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.5" }, { "model": "fortiap", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.5" }, { "model": "fortiap-s", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "6.0.5" }, { "model": "fortiap", "scope": "eq", "trust": 0.8, "vendor": "fortinet", "version": "6.0.5" }, { "model": "fortiap-s", "scope": "eq", "trust": 0.8, "vendor": "fortinet", "version": "6.0.5" }, { "model": "fortiap-u", "scope": "eq", "trust": 0.8, "vendor": "fortinet", "version": "6.0.0" }, { "model": "fortiap-w2", "scope": "eq", "trust": 0.8, "vendor": "fortinet", "version": "6.0.5" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-015067" }, { "db": "NVD", "id": "CVE-2019-15708" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:fortinet:fortiap", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fortinet:fortiap-s", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fortinet:fortiap-u", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fortinet:fortiap-w2", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-015067" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NYC Cyber Command", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-600" } ], "trust": 0.6 }, "cve": "CVE-2019-15708", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2019-15708", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2019-015067", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-147781", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2019-15708", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2019-015067", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-15708", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2019-015067", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202002-600", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-147781", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-147781" }, { "db": "JVNDB", "id": "JVNDB-2019-015067" }, { "db": "CNNVD", "id": "CNNVD-202002-600" }, { "db": "NVD", "id": "CVE-2019-15708" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands. plural FortiAP The product has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. An operating system command injection vulnerability exists in Fortinet FortiAP. The following products and versions are affected: FortiAP-S/W2 versions prior to 6.2.2, versions prior to 6.0.6; FortiAP versions prior to 6.0.5; FortiAP-U versions prior to 6.0.0", "sources": [ { "db": "NVD", "id": "CVE-2019-15708" }, { "db": "JVNDB", "id": "JVNDB-2019-015067" }, { "db": "VULHUB", "id": "VHN-147781" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-15708", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2019-015067", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-600", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.0478", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-147781", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-147781" }, { "db": "JVNDB", "id": "JVNDB-2019-015067" }, { "db": "CNNVD", "id": "CNNVD-202002-600" }, { "db": "NVD", "id": "CVE-2019-15708" } ] }, "id": "VAR-202003-0930", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-147781" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:33:33.868000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "FG-IR-19-209", "trust": 0.8, "url": "https://fortiguard.com/psirt/FG-IR-19-209" }, { "title": "Fortinet FortiAP Fixes for command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=112187" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-015067" }, { "db": "CNNVD", "id": "CNNVD-202002-600" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-147781" }, { "db": "JVNDB", "id": "JVNDB-2019-015067" }, { "db": "NVD", "id": "CVE-2019-15708" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://fortiguard.com/psirt/fg-ir-19-209" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15708" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15708" }, { "trust": 0.6, "url": "https://fortiguard.com/psirt/ fg-ir-19-209" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0478/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-147781" }, { "db": "JVNDB", "id": "JVNDB-2019-015067" }, { "db": "CNNVD", "id": "CNNVD-202002-600" }, { "db": "NVD", "id": "CVE-2019-15708" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-147781" }, { "db": "JVNDB", "id": "JVNDB-2019-015067" }, { "db": "CNNVD", "id": "CNNVD-202002-600" }, { "db": "NVD", "id": "CVE-2019-15708" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-15T00:00:00", "db": "VULHUB", "id": "VHN-147781" }, { "date": "2020-04-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-015067" }, { "date": "2020-02-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-600" }, { "date": "2020-03-15T23:15:11.327000", "db": "NVD", "id": "CVE-2019-15708" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-19T00:00:00", "db": "VULHUB", "id": "VHN-147781" }, { "date": "2020-04-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-015067" }, { "date": "2021-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-600" }, { "date": "2024-11-21T04:29:17.990000", "db": "NVD", "id": "CVE-2019-15708" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-600" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural FortiAP In the product OS Command injection vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-015067" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-600" } ], "trust": 0.6 } }