#VU97116 Improper certificate validation in Fortinet, Inc products - CVE-2022-45856


Vulnerability identifier: #VU97116

Vulnerability risk: Medium

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-45856

CWE-ID: CWE-295

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Fortinet FortiClient for Windows
Server applications / Other server solutions
FortiClient (macOS)
Client/Desktop applications / Software for system administration
FortiClient (Linux)
Client/Desktop applications / Software for system administration
FortiClient (Android)
Mobile applications / Apps for mobile phones
FortiClient (iOS)
Mobile applications / Apps for mobile phones

Vendor: Fortinet, Inc

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to improper validation of client-side certificates in SAML SSO feature. A remote attacker can perform MitM attack between the FortiClient and  both the service provider and the identity provider.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Fortinet FortiClient for Windows: 6.4.0 - 6.4.10, 7.0.0 - 7.0.7

FortiClient (macOS): 6.4.0 - 7.2.4

FortiClient (Linux): 6.4.0 - 7.2.4

FortiClient (Android): 5.0.0 - 7.2.0

FortiClient (iOS): 2.0.0 - 7.0.6


External links
https://www.fortiguard.com/psirt/FG-IR-22-230


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability