Blog

Fortinet has released emergency security patches for the CVE‑2022‑40684 vulnerability on FortiGate firewall devices

07/10/2025

How did Fortinet respond upon discovering a critical vulnerability being exploited on their firewalls? How long did it take to address the issue? And note NSV’s update for customers using FortiGate firewalls.

Table of Contents
Table of Contents
On October 6, 2022, Fortinet confirmed that a critical security vulnerability had been discovered and exploited on Fortigate firewall devices.
 
 


 

The security vulnerability (CVE‑2022‑40684) is an authentication bypass method on the management interface that allows remote threat actors to log into FortiGate firewalls, FortiProxy, and FortiSwitch Manager (FSWM).

In an advisory issued the same day, Fortinet stated: “An authentication bypass using an alternate channel or path vulnerability [CWE‑288] in FortiOS, FortiProxy, and FortiSwitchManager may allow an unauthenticated attacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.”

Fortinet released a security update to address this issue the following day. A Fortinet spokesperson declined to comment when asked whether the vulnerability was being actively exploited.

Several days later, Fortinet finally acknowledged that they were aware of at least one attack in which CVE‑2022‑40684 had been exploited. The company stated: “Fortinet is aware of an instance where this vulnerability was exploited and recommends immediately validating your systems for intrusion indicators in the device logs: user = ‘Local_Process_Access’.”

The following versions are affected by this critical vulnerability:

  • FortiOS versions 7.2.0, 7.2.1
  • FortiOS versions 7.0.0 through 7.0.6
  • FortiProxy version 7.2.0
  • FortiProxy versions 7.0.0 through 7.0.6
  • FortiSwitchManager versions 7.0.0, 7.2.0

Fortinet has released security patches and urges customers to update vulnerable devices to FortiOS 7.0.7 or 7.2.2 or later, FortiProxy 7.0.7 or 7.2.1 or later, and FortiSwitchManager 7.2.1 or later to protect their systems from attacks.

 

Security researchers from the Horizon3 team have developed exploit code and conducted proof‑of‑concept exploitation of this critical vulnerability.

 

According to search data from Shodan, more than 140,000 FortiGate firewall devices are accessible from the Internet and may be vulnerable to attacks if their management interfaces are exposed online.

 
 

Fortinet also advised customers on how to block attacks when immediate deployment of security updates is not possible. Administrators should disable the HTTP/HTTPS management interface or restrict the IP addresses that can access the management interface by using firewall policies.

(Refer to the guidance here: https://www.fortiguard.com/psirt/FG-IR-22-377)

Therefore, NSV recommends that customers using FortiGate firewalls upgrade to version 7.0.7 or 7.2.2 or later to prevent external attacks that could impact production operations.

Share:

Related posts

17/12/2025

Comparing Enterprise Information Security Solutions: Which One Is the Right Choice?

In the digital era, data has become one of the most valuable assets for businesses. Howeve...

04/12/2025

Understanding Cyber Attacks: How They Happen and How Businesses Can Protect Themselves

In today’s digital era, data has become the most valuable asset of every business. Unfortu...

08/10/2025

NSV: Partnering to Protect Businesses Against Ransomware in 2025

Ransomware is malicious software that encrypts data and demands a ransom for recovery. In...

08/10/2025

Cybersecurity Workshop Series 2024: Partnering with NSV to Protect Your Business

As part of NSV’s annual customer care initiatives, the 2024 Cybersecurity Workshop Series...

08/10/2025

Introduction to Trend Micro Email Security

Email impersonation is a preferred attack method used by hackers, alongside ransomware and...

Address Room 101, Technology Center, Thang Long Industrial Park, Thien Loc Commune, Hanoi City, Vietnam

Hotline Tel: +84 243 881 3189 / 90 Hotline: 097 240 3744

Google map Google map

Address 4th Floor, Yoco Building, 41 Nguyen Thi Minh Khai, Saigon Ward, Ho Chi Minh City, Vietnam

Hotline Tel: +84 283 926 0104 / 05

Google map Google map

Address Room 103, Executive Building - Japan Industrial Park – Hai Phong, Hai Phong City, Vietnam.

Hotline Tel: + 84 225 358 7969

Google map Google map

SIGN UP FOR NEWS