{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-27486","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2022-03-21T16:03:48.575Z","datePublished":"2024-08-13T15:51:57.242Z","dateUpdated":"2024-08-14T14:41:14.087Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiDDoS","defaultStatus":"unaffected","versions":[{"version":"5.7.0","status":"affected"},{"versionType":"semver","version":"5.5.0","lessThanOrEqual":"5.5.1","status":"affected"},{"versionType":"semver","version":"5.4.0","lessThanOrEqual":"5.4.2","status":"affected"},{"versionType":"semver","version":"5.3.0","lessThanOrEqual":"5.3.2","status":"affected"},{"version":"5.2.0","status":"affected"},{"version":"5.1.0","status":"affected"},{"version":"5.0.0","status":"affected"},{"version":"4.7.0","status":"affected"},{"version":"4.6.0","status":"affected"},{"version":"4.5.0","status":"affected"}]},{"vendor":"Fortinet","product":"FortiDDoS-F","defaultStatus":"unaffected","versions":[{"version":"6.5.0","status":"affected"},{"versionType":"semver","version":"6.4.0","lessThanOrEqual":"6.4.1","status":"affected"},{"versionType":"semver","version":"6.3.0","lessThanOrEqual":"6.3.4","status":"affected"},{"versionType":"semver","version":"6.2.0","lessThanOrEqual":"6.2.2","status":"affected"},{"versionType":"semver","version":"6.1.0","lessThanOrEqual":"6.1.5","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as `root` via `execute` CLI commands."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2024-08-13T15:51:57.242Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"Improper access control","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C"}}],"solutions":[{"lang":"en","value":"Please upgrade to FortiDDoS version 5.7.1 or above \nPlease upgrade to FortiDDoS version 5.6.2 or above \nPlease upgrade to FortiDDoS version 5.5.2 or above \nPlease upgrade to FortiDDoS version 5.4.3 or above \nPlease upgrade to FortiDDoS-F version 6.5.1 or above \nPlease upgrade to FortiDDoS-F version 6.4.2 or above"}],"references":[{"name":"https://fortiguard.com/psirt/FG-IR-22-047","url":"https://fortiguard.com/psirt/FG-IR-22-047"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-14T14:40:48.122036Z","id":"CVE-2022-27486","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-14T14:41:14.087Z"}}]}}