VYPR
Unrated severityNVD Advisory· Published Jan 22, 2025· Updated Jan 14, 2026

CVE-2022-23439

CVE-2022-23439

Description

A externally controlled reference to a resource in another sphere vulnerability in Fortinet allows attacker to poison web caches via crafted HTTP requests, where the Host header points to an arbitrary webserver

Affected products

17
  • Fortinet/FortiAuthenticatorv5
    cpe:2.3:a:fortinet:fortiauthenticator:6.4.1:*:*:*:*:*:*:*
    Range: 6.4.0
  • cpe:2.3:a:fortinet:fortimail:7.0.3:*:*:*:*:*:*:*
    Range: 7.0.0
  • cpe:2.3:a:fortinet:fortindr:7.2.0:*:*:*:*:*:*:*
    Range: 7.2.0
  • Fortinet/FortiPortalv5
    cpe:2.3:a:fortinet:fortiportal:6.0.9:*:*:*:*:*:*:*
    Range: 6.0.0
  • cpe:2.3:a:fortinet:fortiproxy:7.0.4:*:*:*:*:*:*:*
    Range: 7.0.0
  • Fortinet/FortiRecorderv5
    cpe:2.3:a:fortinet:fortirecorder:6.4.2:*:*:*:*:*:*:*
    Range: 6.4.0
  • Fortinet/FortiSOAR on-premisev5
    cpe:2.3:a:fortinet:fortisoaron-premise:7.2.2:*:*:*:*:*:*:*
    Range: 7.2.0
  • Fortinet/FortiSwitchv5
    cpe:2.3:a:fortinet:fortiswitch:7.0.4:*:*:*:*:*:*:*
    Range: 7.0.0
  • Fortinet/FortiTesterv5
    cpe:2.3:a:fortinet:fortitester:7.2.1:*:*:*:*:*:*:*
    Range: 7.2.0
  • cpe:2.3:a:fortinet:fortivoice:7.0.1:*:*:*:*:*:*:*
    Range: 7.0.0
  • Fortinet/FortiWLCv5
    cpe:2.3:a:fortinet:fortiwlc:8.6.7:*:*:*:*:*:*:*
    Range: 8.6.0
  • Fortinet/FortiADCv5
    cpe:2.3:h:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:*
    Range: 7.0.0
  • cpe:2.3:o:fortinet:fortianalyzer:7.4.2:*:*:*:*:*:*:*
    Range: 7.4.0
  • Fortinet/FortiDDoSv5
    cpe:2.3:o:fortinet:fortiddos:5.5.1:*:*:*:*:*:*:*
    Range: 5.5.0
  • cpe:2.3:o:fortinet:fortiddos-f:6.3.3:*:*:*:*:*:*:*
    Range: 6.3.0
  • cpe:2.3:o:fortinet:fortimanager:7.4.3:*:*:*:*:*:*:*
    Range: 7.4.0
  • cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*
    Range: 7.2.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.