
Cloud Vulnerability DB
A community-led vulnerabilities database
An exposure of sensitive information vulnerability (CVE-2022-35842) was identified in FortiOS SSL-VPN. The vulnerability affects FortiOS versions 7.2.0, versions 7.0.0 through 7.0.6, and versions 6.4.0 through 6.4.9. This security flaw was disclosed on November 1, 2022, and allows remote unauthenticated attackers to gain information about LDAP and SAML settings configured in FortiOS (Fortiguard PSIRT, NVD).
The vulnerability is classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). It received varying CVSS v3.1 severity ratings, with NVD assigning a HIGH severity score of 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), while Fortinet assessed it as LOW severity with a score of 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) (NVD).
The vulnerability allows unauthorized access to sensitive configuration information, specifically LDAP and SAML settings configured in FortiOS. This exposure could potentially provide attackers with valuable information about the authentication infrastructure (Fortiguard PSIRT).
Fortinet has released patches to address this vulnerability. Users are advised to upgrade to FortiOS version 7.2.1 or above, version 7.0.8 or above, or version 6.4.10 or above. As a temporary workaround, administrators can reboot FortiOS, kill the SSL-VPN process, or disable DTLS settings if enabled (Fortiguard PSIRT).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."