An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: VPN(4 tweets) iOS(2 tweets)
List of frequently cited URLs
List of frequently cited URLs
Name | URL |
---|---|
horizon3ai/CVE-2022-40684 | https://github.com/horizon3ai/CVE-2022-40684 |
carlosevieira/CVE-2022-40684 | https://github.com/carlosevieira/CVE-2022-40684 |
secunnix/CVE-2022-40684 | https://github.com/secunnix/CVE-2022-40684 |
Chocapikk/CVE-2022-40684 | https://github.com/Chocapikk/CVE-2022-40684 |
TaroballzChen/CVE-2022-40684-metasploit-scanner | https://github.com/TaroballzChen/CVE-2022-40684-metasploit-scanner |
kljunowsky/CVE-2022-40684-POC | https://github.com/kljunowsky/CVE-2022-40684-POC |
qingsiweisan/CVE-2022-40684 | https://github.com/qingsiweisan/CVE-2022-40684 |
Filiplain/Fortinet-PoC-Auth-Bypass | https://github.com/Filiplain/Fortinet-PoC-Auth-Bypass |
jsongmax/Fortinet-CVE-2022-40684 | https://github.com/jsongmax/Fortinet-CVE-2022-40684 |
Grapphy/fortipwn | https://github.com/Grapphy/fortipwn |
Name | URL |
---|---|
horizon3ai/CVE-2022-40684 | github.com |
carlosevieira/CVE-2022-40684 | github.com |
secunnix/CVE-2022-40684 | github.com |
Chocapikk/CVE-2022-40684 | github.com |
TaroballzChen/CVE-2022-40684-metasploit-scanner | github.com |
kljunowsky/CVE-2022-40684-POC | github.com |
qingsiweisan/CVE-2022-40684 | github.com |
Filiplain/Fortinet-PoC-Auth-Bypass | github.com |
jsongmax/Fortinet-CVE-2022-40684 | github.com |
Grapphy/fortipwn | github.com |