SB2023021902 - Multiple vulnerabilities in FortiNAC 



SB2023021902 - Multiple vulnerabilities in FortiNAC

Published: February 19, 2023 Updated: May 7, 2023

Security Bulletin ID SB2023021902
Severity
Critical
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) External Control of File Name or Path (CVE-ID: CVE-2022-39952)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to application allows an attacker to control path of the files to write within the keyUpload scriptlet. A remote non-authenticated attacker can send a specially crafted HTTP request and upload arbitrary files to the system.

Successful exploitation of the vulnerability may allow an attacker to compromise the affected system.


2) OS Command Injection (CVE-ID: CVE-2022-40677)

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the FortiNAC webserver. A remote privileged user can pass specially crafted data to the application and execute arbitrary OS commands on the system.


3) Insufficiently protected credentials (CVE-ID: CVE-2022-40678)

The vulnerability allows a local user to recover passwords from database.

The vulnerability exists due to FortiNAC stores users' passwords in an insecure way. A local user with access to the database can recover passwords and escalate privileges on the system.


Remediation

Install update from vendor's website.