CVE-2022-39952
FortiNAC vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2022-39952) was discovered in Fortinet FortiNAC that affects multiple versions including 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, and 8.3.7. The vulnerability was internally discovered by Gwendal Guégniaud of Fortinet during a manual secure code audit and was disclosed on February 16, 2023. This external control of file name or path vulnerability allows an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests (NVD, Horizon3).

Technical details

The vulnerability exists in the /bsc/campusMgr/ui/ROOT/configWizard/keyUpload.jsp endpoint, which processes requests containing a file in the key parameter. When exploited, the vulnerability allows writing arbitrary files to /bsc/campusMgr/config.applianceKey, followed by execution of a bash script at /bsc/campusMgr/bin/configApplianceXml. The script changes directory to root (/) and uses the unzip command on attacker-controlled input, enabling arbitrary file writes to any location on the system. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (Critical) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (Horizon3, NVD).

Impact

The vulnerability allows an unauthenticated attacker to achieve remote code execution with root privileges on affected FortiNAC systems. This level of access enables complete system compromise, allowing attackers to execute arbitrary commands, write files to any location on the system, and potentially maintain persistent access through various methods such as cron jobs (Horizon3).

Mitigation and workarounds

Fortinet strongly recommends that affected organizations immediately upgrade their FortiNAC installations to the latest version. It's worth noting that most FortiNAC deployments are typically in air-gapped environments not exposed to the internet, which may provide some natural mitigation against remote exploitation (Fortinet Blog).

Community reactions

Following the advisory publication, there were some inaccurate reports suggesting potential 'mass exploitation' of over 711,234 devices. Fortinet has clarified that these numbers are significantly inflated and do not reflect the actual number of vulnerable devices in production. Additionally, reported exploitation attempts from cloud honeypots may only indicate attempts to use the POC code against generic targets rather than confirmed FortiNAC compromises (Fortinet Blog).

Additional resources


SourceThis report was generated using AI

Related FortiNAC vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-33299CRITICAL9.8
  • FortiNACFortiNAC
  • cpe:2.3:a:fortinet:fortinac
NoYesJun 23, 2023
CVE-2024-31488CRITICAL9
  • FortiNACFortiNAC
  • cpe:2.3:a:fortinet:fortinac
NoYesMay 14, 2024
CVE-2023-22633HIGH7.5
  • FortiNACFortiNAC
  • cpe:2.3:a:fortinet:fortinac
NoYesJun 13, 2023
CVE-2023-26206MEDIUM6.1
  • FortiNACFortiNAC
  • cpe:2.3:a:fortinet:fortinac
NoYesFeb 15, 2024
CVE-2023-33300MEDIUM5.3
  • FortiNACFortiNAC
  • cpe:2.3:a:fortinet:fortinac
NoYesMar 14, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management