cve/2024/CVE-2024-21754.md
2025-09-29 16:08:36 +00:00

22 lines
1.1 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-21754](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21754)
![](https://img.shields.io/static/v1?label=Product&message=FortiOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FortiProxy&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.4.0%3C%3D%207.4.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.4.0%3C%3D%207.4.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20access%20control&color=brighgreen)
### Description
A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions may allow a privileged attacker with super-admin profile and CLI access to decrypting the backup file.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/CyberSecuritist/CVE-2024-21754-Forti-RCE
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/plzheheplztrying/cve_monitor