CVE Vulnerabilities

CVE-2022-43947

Improper Restriction of Excessive Authentication Attempts

Published: Apr 11, 2023 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

AnĀ improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiOS version 7.2.0 through 7.2.3 and before 7.0.10, FortiProxy version 7.2.0 through 7.2.2 and before 7.0.8 administrative interface allows an attacker with a valid user account to perform brute-force attacks on other user accounts via injecting valid login sessions.

Weakness

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.

Affected Software

NameVendorStart VersionEnd Version
FortiproxyFortinet1.0.0 (including)2.0.9 (including)
FortiproxyFortinet7.0.0 (including)7.0.8 (excluding)
FortiproxyFortinet7.2.0 (including)7.2.2 (excluding)
FortiosFortinet6.2.0 (including)6.4.13 (excluding)
FortiosFortinet7.0.0 (including)7.0.11 (excluding)
FortiosFortinet7.2.0 (including)7.2.4 (excluding)

Potential Mitigations

  • Common protection mechanisms include:

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482].

  • Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]

References