The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-42475

CVE-2022-42475: Fortinet FortiOS SSL-VPN RCE Vulnerability

CVE-2022-42475 is a critical heap-based buffer overflow RCE vulnerability in Fortinet FortiOS SSL-VPN that enables unauthenticated attackers to execute arbitrary code remotely. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: February 25, 2026

CVE-2022-42475 Overview

A heap-based buffer overflow vulnerability (CWE-122) exists in the SSL-VPN component of FortiOS and FortiProxy. This memory corruption flaw allows remote unauthenticated attackers to execute arbitrary code or commands via specifically crafted requests to vulnerable FortiGate devices. The vulnerability affects multiple versions of FortiOS spanning from version 6.0.15 and earlier through 7.2.2, as well as FortiProxy versions up to 7.2.1.

Critical Impact

This vulnerability is actively exploited in the wild and has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog. Remote unauthenticated attackers can achieve complete system compromise by executing arbitrary code on affected FortiGate firewalls and FortiProxy devices, potentially gaining persistent access to enterprise network perimeters.

Affected Products

  • Fortinet FortiOS 7.2.0 through 7.2.2
  • Fortinet FortiOS 7.0.0 through 7.0.8
  • Fortinet FortiOS 6.4.0 through 6.4.10
  • Fortinet FortiOS 6.2.0 through 6.2.11
  • Fortinet FortiOS 6.0.15 and earlier
  • Fortinet FortiProxy 7.2.0 through 7.2.1
  • Fortinet FortiProxy 7.0.7 and earlier
  • Fortinet FortiGate 6300F, 6500F, 6501F, 6601F series
  • Fortinet FortiGate 7030E, 7040E, 7060E, 7121F series
  • Fortinet FIM-7901E, FIM-7904E, FIM-7910E, FIM-7920E, FIM-7921F, FIM-7941F
  • Fortinet FPM-7620E, FPM-7620F, FPM-7630E

Discovery Timeline

  • 2023-01-02 - CVE-2022-42475 published to NVD
  • 2025-10-24 - Last updated in NVD database

Technical Details for CVE-2022-42475

Vulnerability Analysis

This vulnerability is a heap-based buffer overflow (CWE-787) affecting the SSL-VPN functionality in FortiOS and FortiProxy products. The flaw occurs when the SSL-VPN daemon processes specially crafted HTTP requests, failing to properly validate the size of input data before copying it into a fixed-size heap buffer. This allows attackers to overflow the buffer and overwrite adjacent heap memory structures.

The vulnerability is particularly dangerous because it affects the SSL-VPN service, which is typically exposed to the internet to provide remote access functionality. As a pre-authentication vulnerability, attackers do not need valid credentials to exploit this flaw, significantly lowering the barrier for successful attacks.

Successful exploitation grants attackers the ability to execute arbitrary code with root privileges on the underlying operating system of the FortiGate or FortiProxy device. Given that these devices serve as network perimeter security appliances, compromise provides attackers with a strategic foothold for lateral movement into protected network segments.

Root Cause

The root cause of CVE-2022-42475 is improper bounds checking in the SSL-VPN request handling code. When processing incoming SSL-VPN connections, the affected code allocates a heap buffer of a predetermined size but fails to validate that user-supplied data fits within this allocation. The vulnerability is classified under CWE-197 (Numeric Truncation Error) and CWE-787 (Out-of-bounds Write), indicating that the flaw involves improper handling of size calculations that leads to writing data beyond the intended buffer boundaries.

Attack Vector

The attack vector is network-based and requires no authentication or user interaction. An attacker can exploit this vulnerability by sending specially crafted HTTPS requests to the SSL-VPN service running on TCP port 443 (or the configured SSL-VPN port). The crafted request contains oversized data fields designed to trigger the buffer overflow condition.

The exploitation flow typically involves:

  1. Attacker identifies an internet-exposed FortiGate device with SSL-VPN enabled
  2. Malicious requests are sent to the SSL-VPN endpoint containing payload data exceeding expected buffer sizes
  3. The heap-based buffer overflow corrupts adjacent memory, allowing control of execution flow
  4. Attacker-supplied shellcode executes with root privileges on the device

Given the network-accessible nature of SSL-VPN services and the pre-authentication attack surface, this vulnerability presents an ideal target for opportunistic attackers and advanced persistent threat (APT) groups. For detailed technical information, refer to the FortiGuard Security Advisory.

Detection Methods for CVE-2022-42475

Indicators of Compromise

  • Monitor for unexpected files in /data/lib/ directory on FortiGate devices, particularly suspicious shared libraries
  • Check for unauthorized modifications to system binaries or configuration files
  • Look for anomalous outbound connections from FortiGate devices to unknown external IP addresses
  • Review SSL-VPN logs for unusual connection patterns or malformed request attempts

Detection Strategies

  • Deploy network-based intrusion detection signatures for malformed SSL-VPN traffic patterns targeting FortiOS devices
  • Implement continuous vulnerability scanning to identify unpatched FortiOS and FortiProxy instances in your environment
  • Monitor FortiGate device integrity using file integrity monitoring solutions to detect unauthorized changes
  • Correlate authentication logs with SSL-VPN access patterns to identify suspicious pre-authentication activity

Monitoring Recommendations

  • Enable and centralize logging for all FortiGate SSL-VPN services to a SIEM platform for real-time analysis
  • Configure alerts for crash events or unexpected service restarts on FortiGate devices that may indicate exploitation attempts
  • Implement network traffic analysis to detect command-and-control communications from compromised appliances
  • Regularly audit FortiGate devices for signs of persistence mechanisms or unauthorized administrative accounts

How to Mitigate CVE-2022-42475

Immediate Actions Required

  • Immediately upgrade FortiOS to version 7.2.3 or later, 7.0.9 or later, 6.4.11 or later, 6.2.12 or later, or 6.0.16 or later
  • Upgrade FortiProxy to version 7.2.2 or later or 7.0.8 or later
  • If immediate patching is not possible, disable SSL-VPN functionality until patches can be applied
  • Conduct forensic analysis on potentially compromised devices to identify signs of exploitation

Patch Information

Fortinet has released security patches addressing this vulnerability. Organizations should apply the appropriate firmware updates as documented in the FortiGuard Security Advisory FG-IR-22-398. Given the active exploitation status and CISA KEV listing, this vulnerability should be prioritized for immediate remediation.

The following patched versions are available:

  • FortiOS: 7.2.3, 7.0.9, 6.4.11, 6.2.12, 6.0.16 and later releases
  • FortiProxy: 7.2.2, 7.0.8 and later releases

Workarounds

  • Disable SSL-VPN functionality if not required for business operations until patching can be completed
  • Implement strict firewall rules to limit SSL-VPN access to known, trusted IP address ranges where feasible
  • Enable multi-factor authentication and monitor for any bypass attempts on SSL-VPN connections
  • Consider deploying a web application firewall (WAF) in front of SSL-VPN services to filter malicious requests
bash
# Example: Verify FortiOS version via CLI
get system status

# Example: Disable SSL-VPN if not needed (FortiOS CLI)
config vpn ssl settings
    set status disable
end

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechFortinet Fortios

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability93.98%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CISA KEV Information
  • In CISA KEVYes
  • CWE References
  • CWE-197

  • CWE-787
  • Technical References
  • CISA Known Exploited Vulnerabilities
  • Vendor Resources
  • FortiGuard Security Advisory
  • Related CVEs
  • CVE-2025-64157: Fortinet FortiOS RCE Vulnerability

  • CVE-2023-40721: Fortinet FortiOS RCE Vulnerability

  • CVE-2024-23113: Fortinet FortiProxy RCE Vulnerability

  • CVE-2021-42757: Fortinet FortiADC RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English