Vulnerability Details CVE-2022-43948
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb version 7.0.0 through 7.0.3, FortiADC version 7.1.0 through 7.1.1, FortiADC version 7.0.0 through 7.0.3, FortiADC 6.2 all versions, FortiADC 6.1 all versions, FortiADC 6.0 all versions, FortiADC 5.4 all versions, FortiADC 5.3 all versions, FortiADC 5.2 all versions, FortiADC 5.1 all versions allows attacker to execute unauthorized code or commands via specifically crafted arguments to existing commands.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 51.7%
CVSS Severity
CVSS v3 Score 6.7
Products affected by CVE-2022-43948
-
cpe:2.3:a:fortinet:fortiadc:5.1.0
-
cpe:2.3:a:fortinet:fortiadc:5.1.1
-
cpe:2.3:a:fortinet:fortiadc:5.1.2
-
cpe:2.3:a:fortinet:fortiadc:5.1.3
-
cpe:2.3:a:fortinet:fortiadc:5.1.4
-
cpe:2.3:a:fortinet:fortiadc:5.1.5
-
cpe:2.3:a:fortinet:fortiadc:5.1.6
-
cpe:2.3:a:fortinet:fortiadc:5.1.7
-
cpe:2.3:a:fortinet:fortiadc:5.2.0
-
cpe:2.3:a:fortinet:fortiadc:5.2.1
-
cpe:2.3:a:fortinet:fortiadc:5.2.2
-
cpe:2.3:a:fortinet:fortiadc:5.2.3
-
cpe:2.3:a:fortinet:fortiadc:5.2.4
-
cpe:2.3:a:fortinet:fortiadc:5.2.5
-
cpe:2.3:a:fortinet:fortiadc:5.2.6
-
cpe:2.3:a:fortinet:fortiadc:5.2.7
-
cpe:2.3:a:fortinet:fortiadc:5.2.8
-
cpe:2.3:a:fortinet:fortiadc:5.3.0
-
cpe:2.3:a:fortinet:fortiadc:5.3.1
-
cpe:2.3:a:fortinet:fortiadc:5.3.2
-
cpe:2.3:a:fortinet:fortiadc:5.3.3
-
cpe:2.3:a:fortinet:fortiadc:5.3.4
-
cpe:2.3:a:fortinet:fortiadc:5.3.5
-
cpe:2.3:a:fortinet:fortiadc:5.3.6
-
cpe:2.3:a:fortinet:fortiadc:5.3.7
-
cpe:2.3:a:fortinet:fortiadc:5.4.0
-
cpe:2.3:a:fortinet:fortiadc:5.4.1
-
cpe:2.3:a:fortinet:fortiadc:5.4.2
-
cpe:2.3:a:fortinet:fortiadc:5.4.3
-
cpe:2.3:a:fortinet:fortiadc:5.4.4
-
cpe:2.3:a:fortinet:fortiadc:5.4.5
-
cpe:2.3:a:fortinet:fortiadc:6.0.0
-
cpe:2.3:a:fortinet:fortiadc:6.0.1
-
cpe:2.3:a:fortinet:fortiadc:6.0.2
-
cpe:2.3:a:fortinet:fortiadc:6.0.3
-
cpe:2.3:a:fortinet:fortiadc:6.0.4
-
cpe:2.3:a:fortinet:fortiadc:6.1.0
-
cpe:2.3:a:fortinet:fortiadc:6.1.1
-
cpe:2.3:a:fortinet:fortiadc:6.1.2
-
cpe:2.3:a:fortinet:fortiadc:6.1.3
-
cpe:2.3:a:fortinet:fortiadc:6.1.4
-
cpe:2.3:a:fortinet:fortiadc:6.1.5
-
cpe:2.3:a:fortinet:fortiadc:6.1.6
-
cpe:2.3:a:fortinet:fortiadc:6.2.0
-
cpe:2.3:a:fortinet:fortiadc:6.2.1
-
cpe:2.3:a:fortinet:fortiadc:6.2.2
-
cpe:2.3:a:fortinet:fortiadc:6.2.3
-
cpe:2.3:a:fortinet:fortiadc:6.2.4
-
cpe:2.3:a:fortinet:fortiadc:6.2.5
-
cpe:2.3:a:fortinet:fortiadc:7.0.0
-
cpe:2.3:a:fortinet:fortiadc:7.0.1
-
cpe:2.3:a:fortinet:fortiadc:7.0.2
-
cpe:2.3:a:fortinet:fortiadc:7.0.3
-
cpe:2.3:a:fortinet:fortiadc:7.1.0
-
cpe:2.3:a:fortinet:fortiadc:7.1.1
-
cpe:2.3:a:fortinet:fortiweb:7.0.0
-
cpe:2.3:a:fortinet:fortiweb:7.0.1
-
cpe:2.3:a:fortinet:fortiweb:7.0.2
-
cpe:2.3:a:fortinet:fortiweb:7.0.3