{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T01:06:30.968","vulnerabilities":[{"cve":{"id":"CVE-2025-22252","sourceIdentifier":"psirt@fortinet.com","published":"2025-05-28T08:15:21.070","lastModified":"2025-06-04T14:35:38.543","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A missing authentication for critical function in Fortinet FortiProxy versions 7.6.0 through 7.6.1, FortiSwitchManager version 7.2.5, and FortiOS versions 7.4.4 through 7.4.6 and version 7.6.0 may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass."},{"lang":"es","value":"La falta de autenticación para una función crítica en Fortinet FortiProxy versiones 7.6.0 a 7.6.1, FortiSwitchManager versión 7.2.5 y FortiOS versiones 7.4.4 a 7.4.6 y versión 7.6.0 puede permitir que un atacante con conocimiento de una cuenta de administrador existente acceda al dispositivo como un administrador válido a través de una omisión de autenticación."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Secondary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiproxy:7.6.0:*:*:*:*:*:*:*","matchCriteriaId":"C1A9E35E-AA55-44C4-BAAC-2E44E6DCE2EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiswitchmanager:7.2.5:*:*:*:*:*:*:*","matchCriteriaId":"8E5AF7C2-3954-4931-8929-7D1A3A9B4FAA"},{"vulnerable":true,"criteria":"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.4","versionEndExcluding":"7.4.7","matchCriteriaId":"6E4A264B-EFE6-466C-8E86-3DA465C4751C"},{"vulnerable":true,"criteria":"cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*","matchCriteriaId":"44CE8EE3-D64A-49C8-87D7-C18B302F864A"}]}]}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-24-472","source":"psirt@fortinet.com","tags":["Vendor Advisory"]}]}}]}