{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-43948","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2022-10-27T07:40:06.589Z","datePublished":"2023-04-11T16:06:08.263Z","dateUpdated":"2024-10-23T14:29:26.566Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiWeb","defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"7.0.0","lessThanOrEqual":"7.0.3","status":"affected"}]},{"vendor":"Fortinet","product":"FortiADC","defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"7.1.0","lessThanOrEqual":"7.1.1","status":"affected"},{"versionType":"semver","version":"7.0.0","lessThanOrEqual":"7.0.3","status":"affected"},{"versionType":"semver","version":"6.2.0","lessThanOrEqual":"6.2.6","status":"affected"},{"versionType":"semver","version":"6.1.0","lessThanOrEqual":"6.1.6","status":"affected"},{"versionType":"semver","version":"6.0.0","lessThanOrEqual":"6.0.4","status":"affected"},{"versionType":"semver","version":"5.4.0","lessThanOrEqual":"5.4.5","status":"affected"},{"versionType":"semver","version":"5.3.0","lessThanOrEqual":"5.3.7","status":"affected"},{"versionType":"semver","version":"5.2.0","lessThanOrEqual":"5.2.8","status":"affected"},{"versionType":"semver","version":"5.1.0","lessThanOrEqual":"5.1.7","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb version 7.0.0 through 7.0.3, FortiADC version 7.1.0 through 7.1.1, FortiADC version 7.0.0 through 7.0.3, FortiADC 6.2 all versions, FortiADC 6.1 all versions, FortiADC 6.0 all versions, FortiADC 5.4 all versions, FortiADC 5.3 all versions, FortiADC 5.2 all versions, FortiADC 5.1 all versions allows attacker to execute unauthorized code or commands via specifically crafted arguments to existing commands."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2023-04-11T16:06:08.263Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"Execute unauthorized code or commands","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C"}}],"solutions":[{"lang":"en","value":"Please upgrade to FortiWeb version 7.2.0 or above Please upgrade to FortiWeb version 7.0.4 or above Please upgrade to FortiADC version 7.2.0 or above Please upgrade to FortiADC version 7.1.2 or above Please upgrade to FortiADC version 7.0.4 or above "}],"references":[{"name":"https://fortiguard.com/psirt/FG-IR-22-186","url":"https://fortiguard.com/psirt/FG-IR-22-186"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T13:40:06.873Z"},"title":"CVE Program Container","references":[{"name":"https://fortiguard.com/psirt/FG-IR-22-186","url":"https://fortiguard.com/psirt/FG-IR-22-186","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-23T14:11:18.385998Z","id":"CVE-2022-43948","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-23T14:29:26.566Z"}}]}}