Vulnerability Details CVE-2022-26118
A privilege chaining vulnerability [CWE-268] in FortiManager and FortiAnalyzer 6.0.x, 6.2.x, 6.4.0 through 6.4.7, 7.0.0 through 7.0.3 may allow a local and authenticated attacker with a restricted shell to escalate their privileges to root due to incorrect permissions of some folders and executable files on the system.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 12.8%
CVSS Severity
CVSS v3 Score 6.7
Products affected by CVE-2022-26118
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.0
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.1
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.10
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.11
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.2
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.3
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.4
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.5
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.6
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.7
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.8
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.9
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.0
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.1
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.2
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.3
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.4
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.5
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.6
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.7
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.8
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.9
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.0
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.1
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.2
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.3
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.4
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.5
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.6
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.7
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.0
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.1
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.2
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.3
-
cpe:2.3:a:fortinet:fortimanager:6.0.0
-
cpe:2.3:a:fortinet:fortimanager:6.0.1
-
cpe:2.3:a:fortinet:fortimanager:6.0.10
-
cpe:2.3:a:fortinet:fortimanager:6.0.11
-
cpe:2.3:a:fortinet:fortimanager:6.0.2
-
cpe:2.3:a:fortinet:fortimanager:6.0.3
-
cpe:2.3:a:fortinet:fortimanager:6.0.4
-
cpe:2.3:a:fortinet:fortimanager:6.0.5
-
cpe:2.3:a:fortinet:fortimanager:6.0.6
-
cpe:2.3:a:fortinet:fortimanager:6.0.7
-
cpe:2.3:a:fortinet:fortimanager:6.0.8
-
cpe:2.3:a:fortinet:fortimanager:6.0.9
-
cpe:2.3:a:fortinet:fortimanager:6.2.0
-
cpe:2.3:a:fortinet:fortimanager:6.2.1
-
cpe:2.3:a:fortinet:fortimanager:6.2.2
-
cpe:2.3:a:fortinet:fortimanager:6.2.3
-
cpe:2.3:a:fortinet:fortimanager:6.2.4
-
cpe:2.3:a:fortinet:fortimanager:6.2.5
-
cpe:2.3:a:fortinet:fortimanager:6.2.6
-
cpe:2.3:a:fortinet:fortimanager:6.2.7
-
cpe:2.3:a:fortinet:fortimanager:6.2.8
-
cpe:2.3:a:fortinet:fortimanager:6.2.9
-
cpe:2.3:a:fortinet:fortimanager:6.4.0
-
cpe:2.3:a:fortinet:fortimanager:6.4.1
-
cpe:2.3:a:fortinet:fortimanager:6.4.2
-
cpe:2.3:a:fortinet:fortimanager:6.4.3
-
cpe:2.3:a:fortinet:fortimanager:6.4.4
-
cpe:2.3:a:fortinet:fortimanager:6.4.5
-
cpe:2.3:a:fortinet:fortimanager:6.4.6
-
cpe:2.3:a:fortinet:fortimanager:6.4.7
-
cpe:2.3:a:fortinet:fortimanager:7.0.0
-
cpe:2.3:a:fortinet:fortimanager:7.0.1
-
cpe:2.3:a:fortinet:fortimanager:7.0.2
-
cpe:2.3:a:fortinet:fortimanager:7.0.3