{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T10:50:46.478","vulnerabilities":[{"cve":{"id":"CVE-2022-30305","sourceIdentifier":"psirt@fortinet.com","published":"2022-12-06T17:15:10.660","lastModified":"2024-11-21T07:02:32.330","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An insufficient logging [CWE-778] vulnerability in FortiSandbox versions 4.0.0 to 4.0.2, 3.2.0 to 3.2.3 and 3.1.0 to 3.1.5 and FortiDeceptor versions 4.2.0, 4.1.0 through 4.1.1, 4.0.0 through 4.0.2, 3.3.0 through 3.3.3, 3.2.0 through 3.2.2,3.1.0 through 3.1.1 and 3.0.0 through 3.0.2  may allow a remote attacker to repeatedly enter incorrect credentials without causing a log entry, and with no limit on the number of failed authentication attempts."},{"lang":"es","value":"Una vulnerabilidad de registro insuficiente [CWE-778] en las versiones 4.0.0 a 4.0.2, 3.2.0 a 3.2.3 y 3.1.0 a 3.1.5 de FortiSandbox y las versiones 4.2.0, 4.1.0 a 4.1.1 de FortiDeceptor. 4.0.0 a 4.0.2, 3.3.0 a 3.3.3, 3.2.0 a 3.2.2, 3.1.0 a 3.1.1 y 3.0.0 a 3.0.2 pueden permitir que un atacante remoto ingrese repetidamente credenciales incorrectas sin generar una entrada de registro y sin límite en el número de intentos fallidos de autenticación."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Secondary","description":[{"lang":"en","value":"CWE-778"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-307"},{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortideceptor:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndIncluding":"3.0.2","matchCriteriaId":"01A6C490-83C0-439C-BC36-157D732F362B"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortideceptor:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2.0","versionEndIncluding":"3.2.2","matchCriteriaId":"DD1D0126-C1C4-4F76-A78F-F0BEC7B3EB0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortideceptor:*:*:*:*:*:*:*:*","versionStartIncluding":"3.3.0","versionEndIncluding":"3.3.3","matchCriteriaId":"840D39F9-C790-4AF6-9E9D-2299083C008A"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortideceptor:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndIncluding":"4.0.2","matchCriteriaId":"16BF9690-3D39-4FCC-A314-68C17E1E0892"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortideceptor:3.1.0:*:*:*:*:*:*:*","matchCriteriaId":"67A22BDE-857F-4A92-A027-38C4A6D6144D"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortideceptor:3.1.1:*:*:*:*:*:*:*","matchCriteriaId":"5DB5762A-D14A-4F7F-A9DA-1979FFFBF1E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortideceptor:4.1.0:*:*:*:*:*:*:*","matchCriteriaId":"48655ECC-C9A9-4AD9-993B-7B2965E9266F"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortideceptor:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"C2CF71B3-7E56-4D31-BE5D-682D553249BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortideceptor:4.2.0:*:*:*:*:*:*:*","matchCriteriaId":"BC3F4599-8FB1-40AF-96A9-11B58DE44C95"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*","versionStartIncluding":"3.1.0","versionEndIncluding":"3.1.5","matchCriteriaId":"2C47A3DB-A02A-488D-B0E1-867A19CE43B8"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndIncluding":"4.0.2","matchCriteriaId":"30CE4EF6-1AC0-49A2-BC7B-43D1B453DC3B"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisandbox:3.2.0:*:*:*:*:*:*:*","matchCriteriaId":"3DDB3490-E30F-45CC-81B7-EFB5C1A60DA7"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisandbox:3.2.1:*:*:*:*:*:*:*","matchCriteriaId":"143DD85B-4CE7-409D-B215-6069D2EF33D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisandbox:3.2.2:*:*:*:*:*:*:*","matchCriteriaId":"53070F6A-CC5B-43C9-96F9-2C0930A8D3CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisandbox:3.2.3:*:*:*:*:*:*:*","matchCriteriaId":"4B38F72A-A271-43FE-8FBF-02AB87BA9D47"}]}]}],"references":[{"url":"https://fortiguard.com/psirt/FG-IR-21-170","source":"psirt@fortinet.com","tags":["Patch","Vendor Advisory"]},{"url":"https://fortiguard.com/psirt/FG-IR-21-170","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}