upcarta
  • Sign In
  • Sign Up
  • Explore
  • Search

Producing a POC for CVE-2022-42475 (Fortinet RCE)

  • Article
  • Apr 14, 2023
  • #Web3
Alain M.
@plopz0r
(Author)
blog.scrt.ch
Read on blog.scrt.ch
1 Recommender
1 Mention
I started searching for information regarding the issue early January 2023 and couldn’t find much information outside of Fortinet’s own advisory and blog post explaining what threat... Show More

I started searching for information regarding the issue early January 2023 and couldn’t find much information outside of Fortinet’s own advisory and blog post explaining what threat actors were doing with the vulnerability. I’ll show later on that other information was already out there, but at the time I couldn’t find it. I’ll blame my poor googling technique…

Fortinet explain in their advisory that the vulnerability is a heap overflow in the Fortigate’s sslvpnd daemon. They also mention that the vulnerability is actively being exploited by threat actors, which means that it must actually be exploitable and not just some denial of service issue.

A follow-up article on Fortinet’s blog provides some insight into how the threat actors were operating. However, most of the article is focused on the post-exploitation and provides a number of indicators of compromise. The details regarding how the vulnerability is actually exploited are obviously lacking. However, some interesting information is revealed, particularly in the two following images:

Show Less
Recommend
Post
Save
Complete
Collect
Mentions
See All
0xor0ne @0xor0ne · May 8, 2023
  • Post
  • From Twitter
Nice blog post by @plopz0r showing how to analyze and produce a PoC for CVE-2022-42475 (heap-based buffer overflow vulnerability in FortiOS SSL-VPN) #cve #infosec #exploit #cybersecurity
  • upcarta ©2025
  • Home
  • About
  • Terms
  • Privacy
  • Cookies
  • @upcarta