{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-22298","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2022-01-03T09:39:36.528Z","datePublished":"2023-10-10T16:49:46.033Z","dateUpdated":"2024-09-18T19:48:48.594Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiIsolator","defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"2.3.0","lessThanOrEqual":"2.3.3","status":"affected"},{"version":"2.2.0","status":"affected"},{"versionType":"semver","version":"2.1.0","lessThanOrEqual":"2.1.2","status":"affected"},{"versionType":"semver","version":"2.0.0","lessThanOrEqual":"2.0.1","status":"affected"},{"versionType":"semver","version":"1.2.0","lessThanOrEqual":"1.2.2","status":"affected"},{"version":"1.1.0","status":"affected"},{"version":"1.0.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiIsolator version 1.0.0, FortiIsolator version 1.1.0, FortiIsolator version 1.2.0 through 1.2.2, FortiIsolator version 2.0.0 through 2.0.1, FortiIsolator version 2.1.0 through 2.1.2, FortiIsolator version 2.2.0, FortiIsolator version 2.3.0 through 2.3.4 allows attacker to execute arbitrary OS commands in the underlying shell via specially crafted input parameters."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2023-10-10T16:49:46.033Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"Execute unauthorized code or commands","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:H/RL:X/RC:C"}}],"solutions":[{"lang":"en","value":"Upgrade to FortiIsolator version 2.4.0 or above."}],"references":[{"name":"https://fortiguard.com/psirt/FG-IR-21-233","url":"https://fortiguard.com/psirt/FG-IR-21-233"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:07:50.440Z"},"title":"CVE Program Container","references":[{"name":"https://fortiguard.com/psirt/FG-IR-21-233","url":"https://fortiguard.com/psirt/FG-IR-21-233","tags":["x_transferred"]}]},{"affected":[{"vendor":"fortinet","product":"fortiisolator","cpes":["cpe:2.3:a:fortinet:fortiisolator:1.0.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:1.1.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:1.2.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:1.2.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:1.2.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:2.0.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:2.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:2.1.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:2.1.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:2.1.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:2.2.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0.0","status":"affected"},{"version":"1.1.0","status":"affected"},{"version":"1.2.0","status":"affected"},{"version":"1.2.1","status":"affected"},{"version":"1.2.2","status":"affected"},{"version":"2.0.0","status":"affected"},{"version":"2.0.1","status":"affected"},{"version":"2.1.0","status":"affected"},{"version":"2.1.1","status":"affected"},{"version":"2.1.2","status":"affected"},{"version":"2.2.0","status":"affected"}]},{"vendor":"fortinet","product":"fortiisolator","cpes":["cpe:2.3:a:fortinet:fortiisolator:2.3.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:2.3.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:2.3.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiisolator:2.3.3:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.3.0","status":"affected","lessThanOrEqual":"2.3.3","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-18T19:43:19.024763Z","id":"CVE-2022-22298","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-18T19:48:48.594Z"}}]}}