Vulnerability Details CVE-2022-27486
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as `root` via `execute` CLI commands.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 67.9%
CVSS Severity
CVSS v3 Score 6.6
Products affected by CVE-2022-27486
-
cpe:2.3:a:fortinet:fortiddos-f:-
-
cpe:2.3:a:fortinet:fortiddos-f:6.1.0
-
cpe:2.3:a:fortinet:fortiddos-f:6.1.4
-
cpe:2.3:a:fortinet:fortiddos-f:6.1.5
-
cpe:2.3:a:fortinet:fortiddos-f:6.2.0
-
cpe:2.3:a:fortinet:fortiddos-f:6.2.3
-
cpe:2.3:a:fortinet:fortiddos-f:6.3.0
-
cpe:2.3:a:fortinet:fortiddos-f:6.3.4
-
cpe:2.3:a:fortinet:fortiddos-f:6.4.0
-
cpe:2.3:a:fortinet:fortiddos-f:6.4.1
-
cpe:2.3:a:fortinet:fortiddos-f:6.4.2
-
cpe:2.3:a:fortinet:fortiddos-f:6.5.0
-
cpe:2.3:a:fortinet:fortiddos:4.5.0
-
cpe:2.3:a:fortinet:fortiddos:5.1.0
-
cpe:2.3:a:fortinet:fortiddos:5.2.0
-
cpe:2.3:a:fortinet:fortiddos:5.3.0
-
cpe:2.3:a:fortinet:fortiddos:5.3.1
-
cpe:2.3:a:fortinet:fortiddos:5.4.0
-
cpe:2.3:a:fortinet:fortiddos:5.4.1
-
cpe:2.3:a:fortinet:fortiddos:5.4.2
-
cpe:2.3:a:fortinet:fortiddos:5.5.0
-
cpe:2.3:a:fortinet:fortiddos:5.5.1
-
cpe:2.3:a:fortinet:fortiddos:5.5.2
-
cpe:2.3:a:fortinet:fortiddos:5.6.0
-
cpe:2.3:a:fortinet:fortiddos:5.6.1
-
cpe:2.3:a:fortinet:fortiddos:5.7.0