CVE-2022-40684
An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6,...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- September 14, 2022
- Published Date
- October 18, 2022
- Last Updated
- October 23, 2024
- Vendor
- Fortinet
- Product
- Fortinet FortiOS, FortiProxy, FortiSwitchManager
- Description
- An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
- Tags
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-10-11 00:00:00 UTC |
Recent Mentions
CVE-2025-32756: Zero-Day Vulnerability in Multiple Fortinet Products Exploited in the Wild
Source: Tenable Blog • Published: 2025-05-14 15:20:32 UTC
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/fortinet_authentication_bypass_cve_2022_40684.rb | 2025-04-29 11:01:12 UTC |
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-40684.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
fortinet_authentication_bypass_cve_2022_40684
Type: metasploit • Created: Unknown
z-bool/CVE-2022-40684
Type: github • Created: 2023-02-27 18:05:34 UTC • Stars: 5
hughink/CVE-2022-40684
Type: github • Created: 2022-10-28 03:46:00 UTC • Stars: 10
TaroballzChen/CVE-2022-40684-metasploit-scanner
Type: github • Created: 2022-10-27 15:11:27 UTC • Stars: 14
qingsiweisan/CVE-2022-40684
Type: github • Created: 2022-10-26 01:48:14 UTC • Stars: 10
und3sc0n0c1d0/CVE-2022-40684
Type: github • Created: 2022-10-19 22:07:24 UTC • Stars: 4
jsongmax/Fortinet-CVE-2022-40684
Type: github • Created: 2022-10-17 09:22:57 UTC • Stars: 2
HAWA771/CVE-2022-40684
Type: github • Created: 2022-10-15 19:43:48 UTC • Stars: 2
mohamedbenchikh/CVE-2022-40684
Type: github • Created: 2022-10-15 17:02:49 UTC • Stars: 4
Chocapikk/CVE-2022-40684
Type: github • Created: 2022-10-15 16:51:25 UTC • Stars: 5
iveresk/CVE-2022-40684
Type: github • Created: 2022-10-14 10:53:50 UTC • Stars: 1
secunnix/CVE-2022-40684
Type: github • Created: 2022-10-14 01:07:01 UTC • Stars: 5
kljunowsky/CVE-2022-40684-POC
Type: github • Created: 2022-10-13 21:07:50 UTC • Stars: 15
carlosevieira/CVE-2022-40684
Type: github • Created: 2022-10-13 18:13:59 UTC • Stars: 87
horizon3ai/CVE-2022-40684
Type: github • Created: 2022-10-13 14:24:12 UTC • Stars: 349
Timeline
-
CVE ID Reserved
-
Exploit Used in Malware
-
Added to KEVIntel
-
Proof of Concept Exploit Available
-
CVE Published to Public
-
Detected by Nuclei
-
Detected by Metasploit