Fortinet has released a security update to address the critical vulnerability(CVE-2022-42475) affecting its FortiOS SSL-VPN.

Based on the official advisory, “Fortinet is aware of an instance where this vulnerability was exploited in the wild, and recommends immediately validating your systems against the following indicators of compromise”


A. Nature of Vulnerability


  • A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.


B. Affected Version


  • 7.2.0 to 7.2.2
  • 7.0.0 to 7.0.8
  • 6.4.0 to 6.4.10
  • 6.2.0 to 6.2.11 


  • 7.0.0 to 7.0.7
  • 6.4.0 to 6.4.9
  • 6.2.0 to 6.2.11
  • 6.0.0 to 6.0.14


C. Indicators of Compromise

IP Address

IP AddressPort,30081,30443, and 20443, and 444




D. Actions to be Taken

CERT-PH recommends the following actions be taken:

  • CERT-PH encourages all Fortinet users to apply the necessary update to mitigate future threats.
  • Proactively monitor and secure identified systems and devices for any suspicious/malicious activities.
  • For additional information, kindly check the links below.