cvelist/2022/45xxx/CVE-2022-45860.json

109 lines
4.1 KiB
JSON
Raw Normal View History

2022-11-23 15:00:36 +00:00
{
2023-05-03 22:00:35 +00:00
"data_version": "4.0",
2022-11-23 15:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-45860",
2023-05-03 22:00:35 +00:00
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
2022-11-23 15:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-05-03 22:00:35 +00:00
"value": "A weak authentication vulnerability [CWE-1390] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in device registration page may allow an unauthenticated attacker to perform password spraying attacks with an increased chance of success."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper access control",
"cweId": "CWE-1390"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Fortinet",
"product": {
"product_data": [
{
"product_name": "FortiNAC",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "9.4.0",
"version_value": "9.4.2"
},
{
"version_affected": "<=",
"version_name": "9.2.0",
"version_value": "9.2.6"
},
{
"version_affected": "<=",
"version_name": "9.1.0",
"version_value": "9.1.9"
},
{
"version_affected": "<=",
"version_name": "8.8.0",
"version_value": "8.8.11"
},
{
"version_affected": "<=",
"version_name": "8.7.0",
"version_value": "8.7.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-464",
"refsource": "MISC",
"name": "https://fortiguard.com/psirt/FG-IR-22-464"
}
]
},
"solution": [
{
"lang": "en",
"value": "Please upgrade to FortiNAC version 9.4.3 or above\r\nPlease upgrade to FortiNAC-F version 7.2.1 or above"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:X/RC:R"
2022-11-23 15:00:36 +00:00
}
]
}
}