Skip to main content

CVE-2022-42475 - FortiOS - heap-based buffer overflow in sslvpnd


dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments

For those folks who run Fortinet Devices:

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.

The vulnerability has already been exploited in the wild. 

CVSSv3 score is 9.3 with a rating of Critical so patch as soon as possible.

More info: PSIRT Advisories | FortiGuard

4 comments

marcofabbri
Forum|alt.badge.img+13
  • On the path to Greatness
  • 990 comments
  • December 13, 2022

This is one of a hell vuln. No good at allo.


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8506 comments
  • December 13, 2022

Read about this yesterday hopefully everyone gets patched.


victorwu
Forum|alt.badge.img+7
  • Veeam Vanguard
  • 375 comments
  • December 13, 2022

@dips Thank you for your information.


marco_s
Forum|alt.badge.img+8
  • Influencer
  • 369 comments
  • January 5, 2023

This is a late post..but, if you cannot upgrade for some reason, you can disable 'ssl.< vdom >' interface on the device or you can disable ssl vpn # sh full-configuration vpn ssl settings | grep status # set status enable <--- change to disable (from Fortinet Support)