CVE-2022-39952

A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0...

Basic Information

CVE State
PUBLISHED
Reserved Date
September 05, 2022
Published Date
February 16, 2023
Last Updated
October 23, 2024
Vendor
Fortinet
Product
FortiNAC
Description
A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP request.

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:U/RC:C

EPSS Score

Score
93.24% (Percentile: 99.79%) as of 2025-04-29

SSVC Information

Exploitation
none
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2025-04-23 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-04-23 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

fortinac_keyupload_file_write

Type: metasploit • Created: Unknown

Metasploit module for CVE-2022-39952

dkstar11q/CVE-2022-39952-better

Type: github • Created: 2023-03-27 17:25:17 UTC • Stars: 0

PoC for CVE-2022-39952 affecting Fortinet FortiNAC.

Chocapikk/CVE-2022-39952

Type: github • Created: 2023-02-26 18:10:04 UTC • Stars: 3

PoC for CVE-2022-39952 affecting Fortinet FortiNAC.

shiyeshu/CVE-2022-39952_webshell

Type: github • Created: 2023-02-22 04:57:06 UTC • Stars: 2

Write Behinder_webshell to target using CVE-2022-39952

horizon3ai/CVE-2022-39952

Type: github • Created: 2023-02-20 15:12:33 UTC • Stars: 267

POC for CVE-2022-39952