Fortinet Series 2 — Analysis of SSLVPN exploit (CVE-2022–42475)
Common Information
Type Value
UUID b570ce29-7699-4b03-87c3-cf69b7c686b3
Fingerprint bbd21150e1ef9f99
Analysis status DONE
Considered CTI value 0
Text language
Published May 26, 2023, 12:57 a.m.
Added to db May 26, 2023, 2:50 p.m.
Last updated Nov. 18, 2024, 11:24 a.m.
Headline Fortinet Series 2 — Analysis of SSLVPN exploit (CVE-2022–42475)
Title Fortinet Series 2 — Analysis of SSLVPN exploit (CVE-2022–42475)
Detected Hints/Tags/Attributes 18/1/12
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 172 Reverse Engineering on Medium https://medium.com/feed/tag/reverse-engineering 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 90
cve-2022-42475
Details Domain 4131
github.com
Details Domain 2
blog.scrt.ch
Details Domain 1
wzt.ac.cn
Details Domain 65
www.fortiguard.com
Details Domain 5
labs.watchtowr.com
Details Github username 2
scrt
Details Url 1
https://github.com/scrt/cve-2022-42475
Details Url 1
https://blog.scrt.ch/2023/03/14/producing-a-poc-for-cve-2022-42475-fortinet-rce
Details Url 1
https://wzt.ac.cn/2022/12/15/cve-2022-42475
Details Url 4
https://www.fortiguard.com/psirt/fg-ir-22-398
Details Url 1
https://labs.watchtowr.com/fortinet-no-more-funny-titles-cve-2022-42475