Ad

CVE-2022-41328

HIGH CVSS 3.1: 7.1 EPSS 0.18% ACTIVE EXPLOIT
Updated Oct 24, 2025
Fortinet

CISA Known Exploited Vulnerability (KEV)

This vulnerability is actively exploited in the wild. Immediate patching is strongly recommended.

Due Date: Apr 04, 2023

Parameter Value
CVSS 7.1 (HIGH)
Affected Versions 6.0.0 — 7.2.4
Fixed In 6.2.14
Type CWE-22 (Path Traversal)
Vendor Fortinet
Public PoC Yes

A improper limitation of a pathname to a restricted directory vulnerability ('path traversal') [CWE-22] in Fortinet FortiOS version 7.2.0 through 7.2.3, 7.0.0 through 7.0.9 and before 6.4.11 allows a privileged attacker to read and write files on the underlying Linux system via crafted CLI commands.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 5

Configuration From (including) Up to (excluding)
Fortinet Fortios
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
6.0.0 <= 6.0.16
Fortinet Fortios
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
6.2.0 6.2.14
Fortinet Fortios
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
6.4.0 6.4.12
Fortinet Fortios
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
7.0.0 7.0.10
Fortinet Fortios
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
7.2.0 7.2.4