A access of uninitialized pointer in Fortinet FortiOS version 7.2.0, 7.0.0 through 7.0.5, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.x, FortiProxy version 7.0.0 through 7.0.4, 2.0.0 through 2.0.9, 1.2.x allows a remote unauthenticated or authenticated attacker to crash the sslvpn daemon via an HTTP GET request.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-22-086 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Oct 2022, 19:13
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-824 | |
References | (CONFIRM) https://fortiguard.com/psirt/FG-IR-22-086 - Vendor Advisory | |
CPE | cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
18 Oct 2022, 16:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-18 15:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-29055
Mitre link : CVE-2022-29055
CVE.ORG link : CVE-2022-29055
JSON object : View
Products Affected
fortinet
- fortios
- fortiproxy
CWE
CWE-824
Access of Uninitialized Pointer