{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-30305","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","requesterUserId":"a0475cc0-be89-4a25-97b3-d1b8023a8677","dateReserved":"2022-05-06T12:09:27.625Z","datePublished":"2022-12-06T16:00:54.500Z","dateUpdated":"2024-10-22T20:51:37.602Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiSandbox","defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"4.0.0","lessThanOrEqual":"4.0.2","status":"affected"},{"versionType":"semver","version":"3.2.0","lessThanOrEqual":"3.2.3","status":"affected"},{"versionType":"semver","version":"3.1.0","lessThanOrEqual":"3.1.5","status":"affected"}]},{"vendor":"Fortinet","product":"FortiDeceptor","defaultStatus":"unaffected","versions":[{"version":"4.2.0","status":"affected"},{"versionType":"semver","version":"4.1.0","lessThanOrEqual":"4.1.1","status":"affected"},{"versionType":"semver","version":"4.0.0","lessThanOrEqual":"4.0.2","status":"affected"},{"versionType":"semver","version":"3.3.0","lessThanOrEqual":"3.3.3","status":"affected"},{"versionType":"semver","version":"3.2.0","lessThanOrEqual":"3.2.2","status":"affected"},{"versionType":"semver","version":"3.1.0","lessThanOrEqual":"3.1.1","status":"affected"},{"versionType":"semver","version":"3.0.0","lessThanOrEqual":"3.0.2","status":"affected"}]}],"descriptions":[{"lang":"en","value":"An insufficient logging [CWE-778] vulnerability in FortiSandbox versions 4.0.0 to 4.0.2, 3.2.0 to 3.2.3 and 3.1.0 to 3.1.5 and FortiDeceptor versions 4.2.0, 4.1.0 through 4.1.1, 4.0.0 through 4.0.2, 3.3.0 through 3.3.3, 3.2.0 through 3.2.2,3.1.0 through 3.1.1 and 3.0.0 through 3.0.2  may allow a remote attacker to repeatedly enter incorrect credentials without causing a log entry, and with no limit on the number of failed authentication attempts."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2022-12-06T16:00:54.500Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-778","description":"Improper access control","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.6,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:X/RC:C"}}],"solutions":[{"lang":"en","value":"Please upgrade to FortiSandbox version 4.2.1 or above\nPlease upgrade to FortiDeceptor version 4.3.0 or above"}],"references":[{"name":"https://fortiguard.com/psirt/FG-IR-21-170","url":"https://fortiguard.com/psirt/FG-IR-21-170"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T06:48:36.289Z"},"title":"CVE Program Container","references":[{"name":"https://fortiguard.com/psirt/FG-IR-21-170","url":"https://fortiguard.com/psirt/FG-IR-21-170","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-22T20:18:52.650973Z","id":"CVE-2022-30305","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-22T20:51:37.602Z"}}]}}