Discover how CVE-2022-42476 impacts Fortinet FortiOS and FortiProxy, allowing administrators to escalate privileges. Learn about affected versions and mitigation steps.
A relative path traversal vulnerability in Fortinet FortiOS and FortiProxy allows privileged VDOM administrators to escalate their privileges to super admin of the box via crafted CLI requests.
Understanding CVE-2022-42476
This section details the impact and technical aspects of CVE-2022-42476.
What is CVE-2022-42476?
The vulnerability involves a relative path traversal issue in Fortinet FortiOS and FortiProxy versions.
The Impact of CVE-2022-42476
The vulnerability enables privileged VDOM administrators to elevate their permissions to super admin using specifically crafted CLI requests.
Technical Details of CVE-2022-42476
This section provides in-depth technical information about CVE-2022-42476.
Vulnerability Description
A relative path traversal flaw in Fortinet FortiOS versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, and versions before 6.4.11, along with FortiProxy versions 7.2.0 through 7.2.2 and 7.0.0 through 7.0.8, allows for privilege escalation.
Affected Systems and Versions
Exploitation Mechanism
Privileged VDOM administrators can abuse the vulnerability by submitting malicious CLI commands to gain super admin rights.
Mitigation and Prevention
Learn what steps to take to mitigate the risks associated with CVE-2022-42476.
Immediate Steps to Take
Upgrade to FortiProxy version 7.2.2 or above, FortiProxy version 7.0.8 or above, FortiOS version 7.2.4 or above, FortiOS version 7.0.9 or above, FortiOS version 6.4.12 or above, or FortiOS version 6.2.13 or above to address the vulnerability.
Long-Term Security Practices
Implement a comprehensive security policy that includes regular updates and monitoring of CVEs to prevent future vulnerabilities.
Patching and Updates
Stay informed about security patches released by Fortinet and apply them promptly to secure your systems.