Learn about CVE-2022-26118, a privilege chaining vulnerability in FortiManager and FortiAnalyzer versions 6.0.x to 7.0.3, enabling attackers to escalate their privileges to root.
A privilege chaining vulnerability in FortiManager and FortiAnalyzer versions 6.0.x, 6.2.x, 6.4.0 through 6.4.7, 7.0.0 through 7.0.3 may allow a local and authenticated attacker to escalate their privileges to root due to incorrect permissions of some folders and executable files on the system.
Understanding CVE-2022-26118
This CVE discloses a privilege chaining vulnerability in FortiManager and FortiAnalyzer that enables a local attacker to escalate their privileges to root.
What is CVE-2022-26118?
CVE-2022-26118 is a privilege escalation vulnerability found in FortiManager and FortiAnalyzer versions 6.0.x to 7.0.3, allowing an attacker with restricted shell access to elevate their privileges to root.
The Impact of CVE-2022-26118
The impact of this vulnerability is rated as having a base score of 6.5 (Medium) on the CVSS v3.1 scale. With low attack complexity and high availability, confidentiality, and integrity impacts, along with high privileges required, it poses a significant risk.
Technical Details of CVE-2022-26118
Here are some technical details regarding CVE-2022-26118:
Vulnerability Description
The vulnerability allows a local attacker with restricted shell access to exploit incorrect permissions on specific system folders and executable files, resulting in privilege escalation to root.
Affected Systems and Versions
Fortinet's FortiManager and FortiAnalyzer versions 6.0.x, 6.2.x, 6.4.0 through 6.4.7, and 7.0.0 through 7.0.3 are affected by this privilege escalation vulnerability.
Exploitation Mechanism
The exploit involves leveraging the incorrect permissions of folders and executable files on the affected systems to gain root privileges.
Mitigation and Prevention
To mitigate the risks associated with CVE-2022-26118, consider the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates