Learn about CVE-2022-45857, an unauthorized access vulnerability in FortiManager allowing attackers to bypass password protection via VDOM creation. Stay protected with recommended solutions.
A vulnerability has been identified in Fortinet's FortiManager software that could allow an attacker unauthorized access to a FortiGate device. This CVE-2022-45857 vulnerability is related to an incorrect user management issue within the VDOM creation component of FortiManager.
Understanding CVE-2022-45857
What is CVE-2022-45857?
The vulnerability in FortiManager versions 6.4.6 and below allows an attacker to access a FortiGate without a password by leveraging newly created VDOMs after the super_admin account is deleted.
The Impact of CVE-2022-45857
The vulnerability poses a medium severity risk with a CVSS base score of 6.0. It has a high impact on availability, requiring high privileges for exploitation.
Technical Details of CVE-2022-45857
Vulnerability Description
The vulnerability stems from improper access control in the VDOM creation component, enabling unauthorized access to FortiManager and subsequently to FortiGate devices.
Affected Systems and Versions
FortiManager versions 6.4.0 to 6.4.7, 6.2.0 to 6.2.8, and 7.0.0 to 7.0.1 are affected by this vulnerability.
Exploitation Mechanism
An attacker can exploit this vulnerability post deletion of the super_admin account to gain access to FortiGate without needing a password through newly created VDOMs.
Mitigation and Prevention
Immediate Steps to Take
To mitigate the CVE-2022-45857 vulnerability, it is recommended to upgrade FortiManager to version 7.0.2 or above, version 6.4.8 or above, or version 6.2.9 or above.
Long-Term Security Practices
Regularly monitor and update the FortiManager software to the latest patched versions to prevent security vulnerabilities such as unauthorized access.
Patching and Updates
Stay informed about security advisories from Fortinet and apply patches promptly to ensure your systems are protected.