Blog

Fortinet has released emergency security patches for the CVE‑2022‑40684 vulnerability on FortiGate firewall devices

07/10/2025

How did Fortinet respond upon discovering a critical vulnerability being exploited on their firewalls? How long did it take to address the issue? And note NSV’s update for customers using FortiGate firewalls.

Table of Contents
Table of Contents
On October 6, 2022, Fortinet confirmed that a critical security vulnerability had been discovered and exploited on Fortigate firewall devices.
 
 


 

The security vulnerability (CVE‑2022‑40684) is an authentication bypass method on the management interface that allows remote threat actors to log into FortiGate firewalls, FortiProxy, and FortiSwitch Manager (FSWM).

In an advisory issued the same day, Fortinet stated: “An authentication bypass using an alternate channel or path vulnerability [CWE‑288] in FortiOS, FortiProxy, and FortiSwitchManager may allow an unauthenticated attacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.”

Fortinet released a security update to address this issue the following day. A Fortinet spokesperson declined to comment when asked whether the vulnerability was being actively exploited.

Several days later, Fortinet finally acknowledged that they were aware of at least one attack in which CVE‑2022‑40684 had been exploited. The company stated: “Fortinet is aware of an instance where this vulnerability was exploited and recommends immediately validating your systems for intrusion indicators in the device logs: user = ‘Local_Process_Access’.”

The following versions are affected by this critical vulnerability:

  • FortiOS versions 7.2.0, 7.2.1
  • FortiOS versions 7.0.0 through 7.0.6
  • FortiProxy version 7.2.0
  • FortiProxy versions 7.0.0 through 7.0.6
  • FortiSwitchManager versions 7.0.0, 7.2.0

Fortinet has released security patches and urges customers to update vulnerable devices to FortiOS 7.0.7 or 7.2.2 or later, FortiProxy 7.0.7 or 7.2.1 or later, and FortiSwitchManager 7.2.1 or later to protect their systems from attacks.

 

Security researchers from the Horizon3 team have developed exploit code and conducted proof‑of‑concept exploitation of this critical vulnerability.

 

According to search data from Shodan, more than 140,000 FortiGate firewall devices are accessible from the Internet and may be vulnerable to attacks if their management interfaces are exposed online.

 
 

Fortinet also advised customers on how to block attacks when immediate deployment of security updates is not possible. Administrators should disable the HTTP/HTTPS management interface or restrict the IP addresses that can access the management interface by using firewall policies.

(Refer to the guidance here: https://www.fortiguard.com/psirt/FG-IR-22-377)

Therefore, NSV recommends that customers using FortiGate firewalls upgrade to version 7.0.7 or 7.2.2 or later to prevent external attacks that could impact production operations.

Share:

Related posts

04/12/2025

Understanding Cyber Attacks: How They Happen and How Businesses Can Protect Themselves

In today’s digital era, data has become the most valuable asset of every business. Unfortu...

20/11/2025

Which PLM software is right for you? A comparison of today’s most popular solutions

During product development, managing data, controlling the lifecycle, and ensuring consist...

13/11/2025

Introduction to PLM: From Design to Manufacturing and Engineering Data Management

As digital transformation accelerates across the manufacturing industry, effective managem...

13/11/2025

CAE in Engineering Design: Suggested Software Options Based on Simulation Needs

During product development, predicting a product’s behavior before physical production is...

08/10/2025

Unlocking CAE: How Simulation Drives Smarter, Safer, and Optimized Designs

In modern design and manufacturing, businesses need not only creative ideas but also produ...

Address Room 101, Technology Center, Thang Long Industrial Park, Thien Loc Commune, Hanoi City, Vietnam

Hotline Tel: +84 243 881 3189 / 90 Hotline: 097 240 3744

Google map Google map

Address 4th Floor, Yoco Building, 41 Nguyen Thi Minh Khai, Saigon Ward, Ho Chi Minh City, Vietnam

Hotline Tel: (84-28) 3926-0104/05

Google map Google map

Address Room 103, Executive Building - Japan Industrial Park – Hai Phong, Hai Phong City, Vietnam.

Hotline Tel: (84-225) 358-7969

Google map Google map

SIGN UP FOR NEWS