Vulnerability Details CVE-2022-39947
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiADC version 7.0.0 through 7.0.2, FortiADC version 6.2.0 through 6.2.3, FortiADC version version 6.1.0 through 6.1.6, FortiADC version 6.0.0 through 6.0.4, FortiADC version 5.4.0 through 5.4.5 may allow an attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.014
EPSS Ranking 79.5%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2022-39947
-
cpe:2.3:a:fortinet:fortiadc:5.4.0
-
cpe:2.3:a:fortinet:fortiadc:5.4.1
-
cpe:2.3:a:fortinet:fortiadc:5.4.2
-
cpe:2.3:a:fortinet:fortiadc:5.4.3
-
cpe:2.3:a:fortinet:fortiadc:5.4.4
-
cpe:2.3:a:fortinet:fortiadc:5.4.5
-
cpe:2.3:a:fortinet:fortiadc:6.0.0
-
cpe:2.3:a:fortinet:fortiadc:6.0.1
-
cpe:2.3:a:fortinet:fortiadc:6.0.2
-
cpe:2.3:a:fortinet:fortiadc:6.0.3
-
cpe:2.3:a:fortinet:fortiadc:6.0.4
-
cpe:2.3:a:fortinet:fortiadc:6.1.0
-
cpe:2.3:a:fortinet:fortiadc:6.1.1
-
cpe:2.3:a:fortinet:fortiadc:6.1.2
-
cpe:2.3:a:fortinet:fortiadc:6.1.3
-
cpe:2.3:a:fortinet:fortiadc:6.1.4
-
cpe:2.3:a:fortinet:fortiadc:6.1.5
-
cpe:2.3:a:fortinet:fortiadc:6.1.6
-
cpe:2.3:a:fortinet:fortiadc:6.2.0
-
cpe:2.3:a:fortinet:fortiadc:6.2.1
-
cpe:2.3:a:fortinet:fortiadc:6.2.2
-
cpe:2.3:a:fortinet:fortiadc:6.2.3
-
cpe:2.3:a:fortinet:fortiadc:7.0.0
-
cpe:2.3:a:fortinet:fortiadc:7.0.1