Vulnerability Details CVE-2022-38377
An improper access control vulnerability [CWE-284] in FortiManager 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.11 and FortiAnalyzer 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.0 through 6.0.12 may allow a remote and authenticated admin user assigned to a specific ADOM to access other ADOMs information such as device information and dashboard information.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 28.1%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2022-38377
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.0
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.1
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.10
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.11
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.2
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.3
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.4
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.5
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.6
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.7
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.8
-
cpe:2.3:a:fortinet:fortianalyzer:6.0.9
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.0
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.1
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.10
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.2
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.3
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.4
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.5
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.6
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.7
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.8
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.9
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.0
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.1
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.2
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.3
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.4
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.5
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.6
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.7
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.8
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.0
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.1
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.2
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.3
-
cpe:2.3:a:fortinet:fortianalyzer:7.2.0
-
cpe:2.3:a:fortinet:fortimanager:6.0.0
-
cpe:2.3:a:fortinet:fortimanager:6.0.1
-
cpe:2.3:a:fortinet:fortimanager:6.0.10
-
cpe:2.3:a:fortinet:fortimanager:6.0.11
-
cpe:2.3:a:fortinet:fortimanager:6.0.2
-
cpe:2.3:a:fortinet:fortimanager:6.0.3
-
cpe:2.3:a:fortinet:fortimanager:6.0.4
-
cpe:2.3:a:fortinet:fortimanager:6.0.5
-
cpe:2.3:a:fortinet:fortimanager:6.0.6
-
cpe:2.3:a:fortinet:fortimanager:6.0.7
-
cpe:2.3:a:fortinet:fortimanager:6.0.8
-
cpe:2.3:a:fortinet:fortimanager:6.0.9
-
cpe:2.3:a:fortinet:fortimanager:6.2.0
-
cpe:2.3:a:fortinet:fortimanager:6.2.1
-
cpe:2.3:a:fortinet:fortimanager:6.2.2
-
cpe:2.3:a:fortinet:fortimanager:6.2.3
-
cpe:2.3:a:fortinet:fortimanager:6.2.4
-
cpe:2.3:a:fortinet:fortimanager:6.2.5
-
cpe:2.3:a:fortinet:fortimanager:6.2.6
-
cpe:2.3:a:fortinet:fortimanager:6.2.7
-
cpe:2.3:a:fortinet:fortimanager:6.2.8
-
cpe:2.3:a:fortinet:fortimanager:6.2.9
-
cpe:2.3:a:fortinet:fortimanager:6.4.0
-
cpe:2.3:a:fortinet:fortimanager:6.4.1
-
cpe:2.3:a:fortinet:fortimanager:6.4.2
-
cpe:2.3:a:fortinet:fortimanager:6.4.3
-
cpe:2.3:a:fortinet:fortimanager:6.4.4
-
cpe:2.3:a:fortinet:fortimanager:6.4.5
-
cpe:2.3:a:fortinet:fortimanager:6.4.6
-
cpe:2.3:a:fortinet:fortimanager:6.4.7
-
cpe:2.3:a:fortinet:fortimanager:7.0.0
-
cpe:2.3:a:fortinet:fortimanager:7.0.1
-
cpe:2.3:a:fortinet:fortimanager:7.0.2
-
cpe:2.3:a:fortinet:fortimanager:7.0.3
-
cpe:2.3:a:fortinet:fortimanager:7.2.0