Fortinet FortiDDoS security bypass | CVE-2022-29060
NAME
Fortinet FortiDDoS security bypass
- Platforms Affected:
 Fortinet FortiDDoS 5.5.0
 Fortinet FortiDDoS 5.5.1
 Fortinet FortiDDoS 5.4.0
 Fortinet FortiDDoS 5.4.1
 Fortinet FortiDDoS 5.4.2
 Fortinet FortiDDoS 5.3.0
 Fortinet FortiDDoS 5.3.1
 Fortinet FortiDDoS 5.2.0
 Fortinet FortiDDoS 5.1.0
- Risk Level:
 8.1
- Exploitability:
 Unproven
- Consequences:
 Bypass Security
DESCRIPTION
Fortinet FortiDDoS could allow a remote attacker to bypass security restrictions, caused by use of a hard-coded cryptographic key in the FortiDDoS API. An attacker could exploit this vulnerability to retrieve the key from one device and sign JWT tokens for any device.
CVSS 3.0 Information
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Access Vector: Network
- Access Complexity: High
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
- Remediation Level: Official Fix
MITIGATION
Refer to FortiGuard Advisory FG-IR-22-071 for patch, upgrade or suggested workaround information. See References.
- Reference Link:
 https://www.fortiguard.com/psirt/FG-IR-22-071
- Reference Link:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29060
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.


![[INCRANSOM] - Ransomware Victim: auge[.]com 2 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image-300x300.png) 
                      ![CovenantC2 Detected - 144[.]91[.]125[.]213:7443 3 covenant](https://www.redpacketsecurity.com/wp-content/uploads/2024/02/covenant-300x87.png) 
                       
                       
