- What is the severity of CVE-2022-23439?
- CVE-2022-23439 has been scored as a medium severity vulnerability.
- How to fix CVE-2022-23439?
- To fix CVE-2022-23439: FortiOS Administrative Interface Please upgrade to FortiOS version 7.0.6 and above, Please upgrade to FortiOS version 7.2.1 and above. AND Set the `admin-host` property to the device hostname, which will disable `Host redirection`: config system global set admin-host "Administrative host for HTTP and HTTPs. When set, will be used in lieu of the client's Host header for any redirection" SSLVPN interface Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.5 or above AND Set the `server-hostname` property to the device hostname, which will disable `Host redirection` for SSL VPN: config vpn ssl settings set server-hostname Server hostname for HTTPS. When set, will be used for SSL VPN web proxy host header for any redirection. Webfilter interface (port 8008) Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.5 or above Please upgrade to FortiOS version 7.0.12 or above Please upgrade to FortiOS version 6.4.13 or above FortiProxy Administrative Interface Please upgrade to FortiProxy version 7.0.5 and above AND Set the `admin-host` property to the device hostname, which will disable `Host redirection`: config system global set admin-host "Administrative host for HTTP and HTTPs. When set, will be used in lieu of the client's Host header for any redirection" SSLVPN interface Please upgrade to FortiProxy version 7.4.0 or above AND Set the `server-hostname` property to the device hostname, which will disable `Host redirection` for SSL VPN: config vpn ssl settings set server-hostname Server hostname for HTTPS. When set, will be used for SSL VPN web proxy host header for any redirection. WebFilter interface (port 8008) Please upgrade to FortiProxy version 7.4.0 or above Please upgrade to FortiRecorder version 7.0.0 or above Please upgrade to FortiRecorder version 6.4.3 or above Please upgrade to FortiRecorder version 6.0.11 or above Please upgrade to FortiNDR version 7.4.0 or above FortiNDR Please upgrade to FortiNDR version 7.2.1 or above Please upgrade to FortiNDR version 7.1.1 or above AND Set the `https-redirect-host` property to the device hostname, which will disable `Host redirection`: config system global set https-redirect-host "Administrative host for HTTP and HTTPs. When set, will be used in lieu of the client's Host header for any redirection" end FortiADC Please upgrade to FortiADC version 7.1.0 or above Please upgrade to FortiADC version 7.0.2 or above Please upgrade to FortiADC version 6.2.4 or above AND Set the `admin-host` property to the device hostname, which will disable `Host redirection`: config system global set admin-host "Administrative host for HTTP and HTTPs. When set, will be used in lieu of the client's Host header for any redirection" FortiDDOS-F Please upgrade to FortiDDoS-F version 6.4.0 or above Please upgrade to FortiDDoS-F version 6.3.4 or above AND Set the `admin-host` property to the device hostname, which will disable `Host redirection`: config system global set admin-host "Administrative host for HTTP and HTTPs. When set, will be used in lieu of the client's Host header for any redirection" Please upgrade to FortiSwitch version 7.2.0 or above Please upgrade to FortiSwitch version 7.0.5 or above Please upgrade to FortiSwitch version 6.4.11 or above Please upgrade to FortiVoice version 7.0.2 or above Please upgrade to FortiVoice version 6.4.9 or above Please upgrade to FortiMail version 7.2.0 or above Please upgrade to FortiMail version 7.0.4 or above Please upgrade to FortiWLC version 8.6.7 or above Please upgrade to FortiAuthenticator version 6.4.2 or above Please upgrade to FortiAuthenticator version 6.3.4 or above Please upgrade to FortiDDoS version 5.6.0 or above Please upgrade to FortiDDoS version 5.5.2 or above Please upgrade to FortiSOAR version 7.3.0 or above Please upgrade to FortiTester version 7.3.0 or above Please upgrade to FortiTester version 7.2.2 or above
- Is CVE-2022-23439 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2022-23439 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2022-23439?
- CVE-2022-23439 affects Fortinet FortiTester, Fortinet FortiOS, Fortinet FortiMail, Fortinet FortiSwitch, Fortinet FortiDDoS-F, Fortinet FortiProxy, Fortinet FortiRecorder, Fortinet FortiNDR, Fortinet FortiADC, Fortinet FortiManager, Fortinet FortiSOAR, Fortinet FortiVoice, Fortinet FortiDDoS, Fortinet FortiWLC, Fortinet FortiAnalyzer, Fortinet FortiPortal, Fortinet FortiAuthenticator.