ID

VAR-202211-0169


CVE

CVE-2022-26122


TITLE

Insufficient validation of data authenticity vulnerability in multiple Fortinet products

Trust: 0.8

sources: JVNDB: JVNDB-2022-022831

DESCRIPTION

An insufficient verification of data authenticity vulnerability [CWE-345] in FortiClient, FortiMail and FortiOS AV engines version 6.2.168 and below and version 6.4.274 and below may allow an attacker to bypass the AV engine via manipulating MIME attachment with junk and pad characters in base64. fortinet's Fortinet Antivirus , FortiMail , FortiOS Exists in an inadequate validation of data reliability vulnerabilities.Information may be tampered with

Trust: 1.71

sources: NVD: CVE-2022-26122 // JVNDB: JVNDB-2022-022831 // VULHUB: VHN-416883

AFFECTED PRODUCTS

vendor:fortinetmodel:fortiosscope:eqversion:7.2.0

Trust: 1.0

vendor:fortinetmodel:fortimailscope:gteversion:6.0.0

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:2.0.49

Trust: 1.0

vendor:fortinetmodel:fortimailscope:lteversion:6.0.12

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:6.0.0

Trust: 1.0

vendor:fortinetmodel:fortimailscope:gteversion:6.4.0

Trust: 1.0

vendor:fortinetmodel:fortimailscope:lteversion:7.0.2

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:2.0.60

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:6.4.0

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:4.4.54

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:0.4.23

Trust: 1.0

vendor:fortinetmodel:fortimailscope:gteversion:7.0.0

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:6.156

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:7.0.0

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:6.252

Trust: 1.0

vendor:fortinetmodel:fortimailscope:lteversion:6.2.9

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:6.33

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:6.2.11

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:6.145

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:7.0.6

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:6.144

Trust: 1.0

vendor:fortinetmodel:fortimailscope:eqversion:4.1.0

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:6.157

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:6.243

Trust: 1.0

vendor:fortinetmodel:fortimailscope:gteversion:6.2.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:6.2.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:6.4.10

Trust: 1.0

vendor:fortinetmodel:fortimailscope:lteversion:6.4.6

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:6.253

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:6.142

Trust: 1.0

vendor:fortinetmodel:antivirus enginescope:eqversion:6.137

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:6.0.15

Trust: 1.0

vendor:フォーティネットmodel:fortimailscope: - version: -

Trust: 0.8

vendor:フォーティネットmodel:fortiosscope: - version: -

Trust: 0.8

vendor:フォーティネットmodel:fortinet antivirusscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-022831 // NVD: CVE-2022-26122

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2022-26122
value: HIGH

Trust: 1.8

psirt@fortinet.com: CVE-2022-26122
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202211-1922
value: HIGH

Trust: 0.6

NVD:
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.1

Trust: 1.0

psirt@fortinet.com:
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2022-26122
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-022831 // NVD: CVE-2022-26122 // NVD: CVE-2022-26122 // CNNVD: CNNVD-202211-1922

PROBLEMTYPE DATA

problemtype:CWE-345

Trust: 1.1

problemtype:Inadequate verification of data reliability (CWE-345) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-416883 // JVNDB: JVNDB-2022-022831 // NVD: CVE-2022-26122

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202211-1922

TYPE

data forgery

Trust: 0.6

sources: CNNVD: CNNVD-202211-1922

CONFIGURATIONS

sources: NVD: CVE-2022-26122

PATCH

title:FG-IR-22-074url:https://fortiguard.com/psirt/fg-ir-22-074

Trust: 0.8

title:Fortinet FortiMail and FortiClient Repair measures for data forgery problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213135

Trust: 0.6

sources: JVNDB: JVNDB-2022-022831 // CNNVD: CNNVD-202211-1922

EXTERNAL IDS

db:NVDid:CVE-2022-26122

Trust: 3.3

db:JVNDBid:JVNDB-2022-022831

Trust: 0.8

db:CNNVDid:CNNVD-202211-1922

Trust: 0.6

db:VULHUBid:VHN-416883

Trust: 0.1

sources: VULHUB: VHN-416883 // JVNDB: JVNDB-2022-022831 // NVD: CVE-2022-26122 // CNNVD: CNNVD-202211-1922

REFERENCES

url:https://fortiguard.com/psirt/fg-ir-22-074

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-26122

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-26122/

Trust: 0.6

url:https://vigilance.fr/vulnerability/fortinet-fortios-forticlient-ingress-filtrering-bypass-via-av-engine-39832

Trust: 0.6

sources: VULHUB: VHN-416883 // JVNDB: JVNDB-2022-022831 // NVD: CVE-2022-26122 // CNNVD: CNNVD-202211-1922

SOURCES

db:VULHUBid:VHN-416883
db:JVNDBid:JVNDB-2022-022831
db:NVDid:CVE-2022-26122
db:CNNVDid:CNNVD-202211-1922

LAST UPDATE DATE

2023-12-18T11:55:22.331000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-416883date:2022-11-04T00:00:00
db:JVNDBid:JVNDB-2022-022831date:2023-11-21T01:50:00
db:NVDid:CVE-2022-26122date:2022-11-04T13:20:04.217
db:CNNVDid:CNNVD-202211-1922date:2022-11-07T00:00:00

SOURCES RELEASE DATE

db:VULHUBid:VHN-416883date:2022-11-02T00:00:00
db:JVNDBid:JVNDB-2022-022831date:2023-11-21T00:00:00
db:NVDid:CVE-2022-26122date:2022-11-02T12:15:52.747
db:CNNVDid:CNNVD-202211-1922date:2022-11-02T00:00:00