{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T10:32:15.207","vulnerabilities":[{"cve":{"id":"CVE-2022-39947","sourceIdentifier":"psirt@fortinet.com","published":"2023-01-03T17:15:10.400","lastModified":"2024-11-21T07:18:32.310","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiADC version 7.0.0 through 7.0.2, FortiADC version 6.2.0 through 6.2.3, FortiADC version version 6.1.0 through 6.1.6, FortiADC version 6.0.0 through 6.0.4, FortiADC version 5.4.0 through 5.4.5 may allow an attacker to execute unauthorized code or commands via specifically crafted HTTP requests."},{"lang":"es","value":"Una neutralización incorrecta de elementos especiales utilizados en un comando del sistema operativo ('inyección de comando del sistema operativo') en Fortinet FortiADC versión 7.0.0 a 7.0.2, FortiADC versión 6.2.0 a 6.2.3, FortiADC versión 6.1.0 a 6.1.6 , FortiADC versión 6.0.0 a 6.0.4, FortiADC versión 5.4.0 a 5.4.5 puede permitir a un atacante ejecutar código o comandos no autorizados a través de solicitudes HTTP específicamente manipuladas."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.0","versionEndIncluding":"5.4.5","matchCriteriaId":"54EBC78D-0358-474F-9654-3EF9950D563B"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.4","matchCriteriaId":"3ADB57D8-1ABE-4401-B1B0-4640A34C555A"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.0","versionEndIncluding":"6.1.6","matchCriteriaId":"D31CF79E-6C56-4CD0-9DD2-FBB48D503786"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.0","versionEndIncluding":"6.2.3","matchCriteriaId":"51C6A8FD-8D0D-4CBA-BA34-A34D12CE69ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:*","matchCriteriaId":"D78A58AA-5F2F-4CC3-8299-EC320E36CF5E"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"CE3123F6-4360-45F8-9A90-C0D35CC73D1D"}]}]}],"references":[{"url":"https://fortiguard.com/psirt/FG-IR-22-061","source":"psirt@fortinet.com","tags":["Patch","Vendor Advisory"]},{"url":"https://fortiguard.com/psirt/FG-IR-22-061","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}