cve/2024/CVE-2024-21754.md

22 lines
1.1 KiB
Markdown
Raw Normal View History

2024-07-25 21:25:12 +00:00
### [CVE-2024-21754](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21754)
![](https://img.shields.io/static/v1?label=Product&message=FortiOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FortiProxy&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.4.0%3C%3D%207.4.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.4.0%3C%3D%207.4.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20access%20control&color=brighgreen)
### Description
A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions may allow a privileged attacker with super-admin profile and CLI access to decrypting the backup file.
### POC
#### Reference
No PoCs from references.
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/CyberSecuritist/CVE-2024-21754-Forti-RCE
2024-07-25 21:25:12 +00:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00
- https://github.com/plzheheplztrying/cve_monitor
2024-07-25 21:25:12 +00:00