Vulnerability Description
A access of uninitialized pointer in Fortinet FortiOS version 7.2.0, 7.0.0 through 7.0.5, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.x, FortiProxy version 7.0.0 through 7.0.4, 2.0.0 through 2.0.9, 1.2.x allows a remote unauthenticated or authenticated attacker to crash the sslvpn daemon via an HTTP GET request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortiproxy | >= 1.2.6, < 1.2.13 |
| Fortinet | Fortios | >= 6.2.0, < 6.2.11 |
Related Weaknesses (CWE)
References
- https://fortiguard.com/psirt/FG-IR-22-086Vendor Advisory
- https://fortiguard.com/psirt/FG-IR-22-086Vendor Advisory
FAQ
What is CVE-2022-29055?
CVE-2022-29055 is a vulnerability with a CVSS score of 7.5 (HIGH). A access of uninitialized pointer in Fortinet FortiOS version 7.2.0, 7.0.0 through 7.0.5, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.x, FortiProxy version 7.0.0 through 7.0.4, 2.0.0 through 2.0.9,...
How severe is CVE-2022-29055?
CVE-2022-29055 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-29055?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortiproxy, Fortinet Fortios.