cvelist/2022/26xxx/CVE-2022-26117.json

91 lines
3.3 KiB
JSON
Raw Normal View History

2022-02-25 15:01:11 +00:00
{
2023-01-31 00:00:38 +00:00
"data_version": "4.0",
2022-02-25 15:01:11 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-26117",
2022-07-05 17:28:44 +02:00
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
},
2023-01-31 00:00:38 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "An empty password in configuration file vulnerability [CWE-258] in FortiNAC version 8.3.7 and below, 8.5.2 and below, 8.5.4, 8.6.0, 8.6.5 and below, 8.7.6 and below, 8.8.11 and below, 9.1.5 and below, 9.2.3 and below may allow an authenticated attacker to access the MySQL databases via the CLI."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Execute unauthorized code or commands"
}
]
}
]
},
2022-07-05 17:28:44 +02:00
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Fortinet",
"product": {
"product_data": [
{
"product_name": "Fortinet FortiNAC",
"version": {
"version_data": [
{
2023-01-31 00:00:38 +00:00
"version_value": "FortiNAC version 8.3.7 and below, 8.5.2 and below, 8.5.4, 8.6.0, 8.6.5 and below, 8.7.6 and below, 8.8.11 and below, 9.1.5 and below, 9.2.3 and below.",
"version_affected": "="
2022-07-05 17:28:44 +02:00
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
2023-01-31 00:00:38 +00:00
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-r259-5p5p-2q47",
"refsource": "MISC",
"name": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-r259-5p5p-2q47"
},
{
"url": "https://fortiguard.com/psirt/FG-IR-22-058",
"refsource": "MISC",
"name": "https://fortiguard.com/psirt/FG-IR-22-058"
2022-07-05 17:28:44 +02:00
}
]
2022-02-25 15:01:11 +00:00
},
2023-01-31 00:00:38 +00:00
"impact": {
"cvss": [
2022-02-25 15:01:11 +00:00
{
2023-01-31 00:00:38 +00:00
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"exploitCodeMaturity": "PROOF_OF_CONCEPT",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "REASONABLE",
"baseScore": 8.8,
"temporalScore": 8,
"baseSeverity": "HIGH",
"temporalSeverity": "HIGH"
2022-02-25 15:01:11 +00:00
}
]
}
}