Vulnerability Details CVE-2022-45856
An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientAndroid 6.4 all versions, 7.0 all versions, 7.2.0 and FortiClientiOS 5.6 all versions, 6.0.0 through 6.0.1, 7.0.0 through 7.0.6 SAML SSO feature may allow an unauthenticated attacker to man-in-the-middle the communication between the FortiClient and both the service provider and the identity provider.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.0%
CVSS Severity
CVSS v3 Score 4.8
Products affected by CVE-2022-45856
-
cpe:2.3:a:fortinet:forticlient:*
-
cpe:2.3:a:fortinet:forticlient:2.0
-
cpe:2.3:a:fortinet:forticlient:5.0
-
cpe:2.3:a:fortinet:forticlient:5.2.028
-
cpe:2.3:a:fortinet:forticlient:5.2.3.091
-
cpe:2.3:a:fortinet:forticlient:6.0.0
-
cpe:2.3:a:fortinet:forticlient:6.0.1
-
cpe:2.3:a:fortinet:forticlient:6.0.2
-
cpe:2.3:a:fortinet:forticlient:6.0.3
-
cpe:2.3:a:fortinet:forticlient:6.0.4
-
cpe:2.3:a:fortinet:forticlient:6.0.5
-
cpe:2.3:a:fortinet:forticlient:6.2.1
-
cpe:2.3:a:fortinet:forticlient:6.2.2
-
cpe:2.3:a:fortinet:forticlient:6.2.3
-
cpe:2.3:a:fortinet:forticlient:6.2.4
-
cpe:2.3:a:fortinet:forticlient:6.4.0
-
cpe:2.3:a:fortinet:forticlient:6.4.1
-
cpe:2.3:a:fortinet:forticlient:6.4.10
-
cpe:2.3:a:fortinet:forticlient:6.4.2
-
cpe:2.3:a:fortinet:forticlient:6.4.3
-
cpe:2.3:a:fortinet:forticlient:6.4.4
-
cpe:2.3:a:fortinet:forticlient:6.4.5
-
cpe:2.3:a:fortinet:forticlient:6.4.6
-
cpe:2.3:a:fortinet:forticlient:6.4.7
-
cpe:2.3:a:fortinet:forticlient:6.4.8
-
cpe:2.3:a:fortinet:forticlient:6.4.9
-
cpe:2.3:a:fortinet:forticlient:7.0.0
-
cpe:2.3:a:fortinet:forticlient:7.0.1
-
cpe:2.3:a:fortinet:forticlient:7.0.10
-
cpe:2.3:a:fortinet:forticlient:7.0.11
-
cpe:2.3:a:fortinet:forticlient:7.0.12
-
cpe:2.3:a:fortinet:forticlient:7.0.13
-
cpe:2.3:a:fortinet:forticlient:7.0.2
-
cpe:2.3:a:fortinet:forticlient:7.0.3
-
cpe:2.3:a:fortinet:forticlient:7.0.4
-
cpe:2.3:a:fortinet:forticlient:7.0.5
-
cpe:2.3:a:fortinet:forticlient:7.0.6
-
cpe:2.3:a:fortinet:forticlient:7.0.7
-
cpe:2.3:a:fortinet:forticlient:7.0.8
-
cpe:2.3:a:fortinet:forticlient:7.0.9
-
cpe:2.3:a:fortinet:forticlient:7.2.0
-
cpe:2.3:a:fortinet:forticlient:7.2.1
-
cpe:2.3:a:fortinet:forticlient:7.2.2
-
cpe:2.3:a:fortinet:forticlient:7.2.3
-
cpe:2.3:a:fortinet:forticlient:7.2.4