mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
78 lines
2.5 KiB
JSON
78 lines
2.5 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2021-26112",
|
|
"ASSIGNER": "psirt@fortinet.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Fortinet",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Fortinet FortiWAN",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "FortiWAN before 4.5.9"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "High",
|
|
"attackVector": "Network",
|
|
"availabilityImpact": "High",
|
|
"baseScore": 7.7,
|
|
"baseSeverity": "High",
|
|
"confidentialityImpact": "High",
|
|
"integrityImpact": "High",
|
|
"privilegesRequired": "None",
|
|
"scope": "Unchanged",
|
|
"userInteraction": "None",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Execute unauthorized code or commands"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://fortiguard.com/psirt/FG-IR-21-065",
|
|
"url": "https://fortiguard.com/psirt/FG-IR-21-065"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN before 4.5.9 may allow an unauthenticated attacker to potentially corrupt control data in memory and execute arbitrary code via specifically crafted requests."
|
|
}
|
|
]
|
|
}
|
|
} |