Critical Severity Buffer Overflow 0-Day Vulnerability in Fortinet SSL-VPN Under Active Exploitation (CVE-2022- 42475)
Common Information
Type Value
UUID c3977436-9da3-44bc-9e8c-2434d13dadb3
Fingerprint b7cc2f87cf658fc9
Analysis status DONE
Considered CTI value 0
Text language
Published Dec. 12, 2022, 7:53 p.m.
Added to db Nov. 6, 2023, 6:31 p.m.
Last updated Nov. 17, 2024, 12:57 p.m.
Headline Critical Severity Buffer Overflow 0-Day Vulnerability in Fortinet SSL-VPN Under Active Exploitation (CVE-2022- 42475)
Title Critical Severity Buffer Overflow 0-Day Vulnerability in Fortinet SSL-VPN Under Active Exploitation (CVE-2022- 42475)
Detected Hints/Tags/Attributes 16/1/16
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 205 Kudelski Security Research https://research.kudelskisecurity.com/feed/ 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 90
cve-2022-42475
Details Domain 6
libgif.so
Details Domain 6
libiptcp.so
Details Domain 5
libipudp.so
Details Domain 4
libjepg.so
Details Domain 65
www.fortiguard.com
Details Domain 138
www.securityweek.com
Details Domain 1
bibstech.live
Details File 5
libips.bak
Details IPv4 3
188.34.130.40
Details IPv4 3
103.131.189.143
Details IPv4 3
192.36.119.61
Details IPv4 3
172.247.168.153
Details Url 4
https://www.fortiguard.com/psirt/fg-ir-22-398
Details Url 1
https://www.securityweek.com/fortinet-ships-emergency-patch-already-exploited-vpn-flaw
Details Url 1
https://bibstech.live/fortinet-confirms-vpn-vulnerability-exploited-in-the-wild