Two high-severity vulnerabilities were found in Fortinet’s FortiADC and FortiTester. According to Fortinet’s advisory, CVE-2022-39947 impacts FortiADC and may allow an authenticated attacker with access to the web GUI to execute unauthorized code or commands via specifically crafted HTTP requests. CVE-2022-35845 impacts FortiTester and is a collection of command injection flaws.
CVE-2022-39947 has a CVSS score of 8.6. The flaw was located in the FortiADC web interface and could lead to arbitrary code execution. The following versions of FortiADC are impacted:
CVE-2022-35845 is a collection of flaws in FortiTester and has a CVSS score of 7.6. Fortinet describes them as improper neutralization of special elements used in an OS Command (‘OS Command Injection) vulnerabilities [CWE-78] that may allow an unauthenticated attacker to execute arbitrary commands in the underlying shell. The following FortiTester products are impacted:
Fortinet has fixed the above vulnerabilities and highly recommends that users upgrade to the following FortiADC versions:
Fortinet also recommends that users upgrade to the following FortiTester versions:
Avertium recommends that users of FortiADC and FortiTester upgrade to the recommended versions.
At this time, there are no known IoCs associated with CVE-2022-39947 and CVE-2022-35845. Avertium’s threat hunters remain vigilant in locating IoCs for our customers. Should any be located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.