Vulnerability Details CVE-2022-22305
An improper certificate validation vulnerability [CWE-295] in FortiManager 7.0.1 and below, 6.4.6 and below; FortiAnalyzer 7.0.2 and below, 6.4.7 and below; FortiOS 6.2.x and 6.0.x; FortiSandbox 4.0.x, 3.2.x and 3.1.x may allow a network adjacent and unauthenticated attacker to man-in-the-middle the communication between the listed products and some external peers.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 22.0%
CVSS Severity
CVSS v3 Score 5.4
Products affected by CVE-2022-22305
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.0
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.1
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.10
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.11
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.2
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.3
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.4
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.5
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.6
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.7
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.8
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.9
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.10
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.11
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.12
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.9
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.0
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.1
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.2
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.3
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.4
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.5
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.6
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.7
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.0
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.1
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.2
-
cpe:2.3:a:fortinet:fortimanager:6.0.0
-
cpe:2.3:a:fortinet:fortimanager:6.0.1
-
cpe:2.3:a:fortinet:fortimanager:6.0.10
-
cpe:2.3:a:fortinet:fortimanager:6.0.11
-
cpe:2.3:a:fortinet:fortimanager:6.0.2
-
cpe:2.3:a:fortinet:fortimanager:6.0.3
-
cpe:2.3:a:fortinet:fortimanager:6.0.4
-
cpe:2.3:a:fortinet:fortimanager:6.0.5
-
cpe:2.3:a:fortinet:fortimanager:6.0.6
-
cpe:2.3:a:fortinet:fortimanager:6.0.7
-
cpe:2.3:a:fortinet:fortimanager:6.0.8
-
cpe:2.3:a:fortinet:fortimanager:6.0.9
-
cpe:2.3:a:fortinet:fortimanager:6.2.0
-
cpe:2.3:a:fortinet:fortimanager:6.2.1
-
cpe:2.3:a:fortinet:fortimanager:6.2.10
-
cpe:2.3:a:fortinet:fortimanager:6.2.11
-
cpe:2.3:a:fortinet:fortimanager:6.2.2
-
cpe:2.3:a:fortinet:fortimanager:6.2.3
-
cpe:2.3:a:fortinet:fortimanager:6.2.4
-
cpe:2.3:a:fortinet:fortimanager:6.2.5
-
cpe:2.3:a:fortinet:fortimanager:6.2.6
-
cpe:2.3:a:fortinet:fortimanager:6.2.7
-
cpe:2.3:a:fortinet:fortimanager:6.2.8
-
cpe:2.3:a:fortinet:fortimanager:6.2.9
-
cpe:2.3:a:fortinet:fortimanager:6.4.0
-
cpe:2.3:a:fortinet:fortimanager:6.4.1
-
cpe:2.3:a:fortinet:fortimanager:6.4.2
-
cpe:2.3:a:fortinet:fortimanager:6.4.3
-
cpe:2.3:a:fortinet:fortimanager:6.4.4
-
cpe:2.3:a:fortinet:fortimanager:6.4.5
-
cpe:2.3:a:fortinet:fortimanager:6.4.6
-
cpe:2.3:a:fortinet:fortimanager:7.0.0
-
cpe:2.3:a:fortinet:fortimanager:7.0.1
-
cpe:2.3:a:fortinet:fortisandbox:3.0.0
-
cpe:2.3:a:fortinet:fortisandbox:3.0.1
-
cpe:2.3:a:fortinet:fortisandbox:3.0.2
-
cpe:2.3:a:fortinet:fortisandbox:3.0.3
-
cpe:2.3:a:fortinet:fortisandbox:3.0.4
-
cpe:2.3:a:fortinet:fortisandbox:3.0.5
-
cpe:2.3:a:fortinet:fortisandbox:3.0.6
-
cpe:2.3:a:fortinet:fortisandbox:3.0.7
-
cpe:2.3:a:fortinet:fortisandbox:3.1.0
-
cpe:2.3:a:fortinet:fortisandbox:3.1.1
-
cpe:2.3:a:fortinet:fortisandbox:3.1.2
-
cpe:2.3:a:fortinet:fortisandbox:3.1.3
-
cpe:2.3:a:fortinet:fortisandbox:3.1.4
-
cpe:2.3:a:fortinet:fortisandbox:3.1.5
-
cpe:2.3:a:fortinet:fortisandbox:3.2.0
-
cpe:2.3:a:fortinet:fortisandbox:3.2.1
-
cpe:2.3:a:fortinet:fortisandbox:3.2.2
-
cpe:2.3:a:fortinet:fortisandbox:3.2.3
-
cpe:2.3:a:fortinet:fortisandbox:3.2.4
-
cpe:2.3:a:fortinet:fortisandbox:4.0.0
-
cpe:2.3:a:fortinet:fortisandbox:4.0.1
-
cpe:2.3:a:fortinet:fortisandbox:4.0.2
-
cpe:2.3:o:fortinet:fortios:5.6.10
-
cpe:2.3:o:fortinet:fortios:5.6.11
-
cpe:2.3:o:fortinet:fortios:5.6.12
-
cpe:2.3:o:fortinet:fortios:5.6.13
-
cpe:2.3:o:fortinet:fortios:5.6.14
-
cpe:2.3:o:fortinet:fortios:6.0.0
-
cpe:2.3:o:fortinet:fortios:6.0.1
-
cpe:2.3:o:fortinet:fortios:6.0.10
-
cpe:2.3:o:fortinet:fortios:6.0.11
-
cpe:2.3:o:fortinet:fortios:6.0.12
-
cpe:2.3:o:fortinet:fortios:6.0.13
-
cpe:2.3:o:fortinet:fortios:6.0.14
-
cpe:2.3:o:fortinet:fortios:6.0.15
-
cpe:2.3:o:fortinet:fortios:6.0.16
-
cpe:2.3:o:fortinet:fortios:6.0.17
-
cpe:2.3:o:fortinet:fortios:6.0.2
-
cpe:2.3:o:fortinet:fortios:6.0.3
-
cpe:2.3:o:fortinet:fortios:6.0.4
-
cpe:2.3:o:fortinet:fortios:6.0.5
-
cpe:2.3:o:fortinet:fortios:6.0.6
-
cpe:2.3:o:fortinet:fortios:6.0.7
-
cpe:2.3:o:fortinet:fortios:6.0.8
-
cpe:2.3:o:fortinet:fortios:6.0.9
-
cpe:2.3:o:fortinet:fortios:6.2.0
-
cpe:2.3:o:fortinet:fortios:6.2.1
-
cpe:2.3:o:fortinet:fortios:6.2.10
-
cpe:2.3:o:fortinet:fortios:6.2.11
-
cpe:2.3:o:fortinet:fortios:6.2.12
-
cpe:2.3:o:fortinet:fortios:6.2.13
-
cpe:2.3:o:fortinet:fortios:6.2.14
-
cpe:2.3:o:fortinet:fortios:6.2.15
-
cpe:2.3:o:fortinet:fortios:6.2.2
-
cpe:2.3:o:fortinet:fortios:6.2.3
-
cpe:2.3:o:fortinet:fortios:6.2.4
-
cpe:2.3:o:fortinet:fortios:6.2.5
-
cpe:2.3:o:fortinet:fortios:6.2.6
-
cpe:2.3:o:fortinet:fortios:6.2.7
-
cpe:2.3:o:fortinet:fortios:6.2.8
-
cpe:2.3:o:fortinet:fortios:6.2.9