mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
146 lines
5.0 KiB
JSON
146 lines
5.0 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2021-43074",
|
||
|
"sourceIdentifier": "psirt@fortinet.com",
|
||
|
"published": "2023-02-16T19:15:11.677",
|
||
|
"lastModified": "2023-02-24T23:48:09.670",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "An improper verification of cryptographic signature vulnerability [CWE-347] in FortiWeb 6.4 all versions, 6.3.16 and below, 6.2 all versions, 6.1 all versions, 6.0 all versions; FortiOS 7.0.3 and below, 6.4.8 and below, 6.2 all versions, 6.0 all versions; FortiSwitch 7.0.3 and below, 6.4.10 and below, 6.2 all versions, 6.0 all versions; FortiProxy 7.0.1 and below, 2.0.7 and below, 1.2 all versions, 1.1 all versions, 1.0 all versions may allow an attacker to decrypt portions of the administrative session management cookie if able to intercept the latter."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "LOW",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "LOW",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 4.3,
|
||
|
"baseSeverity": "MEDIUM"
|
||
|
},
|
||
|
"exploitabilityScore": 2.8,
|
||
|
"impactScore": 1.4
|
||
|
},
|
||
|
{
|
||
|
"source": "psirt@fortinet.com",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "LOW",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "LOW",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 4.3,
|
||
|
"baseSeverity": "MEDIUM"
|
||
|
},
|
||
|
"exploitabilityScore": 2.8,
|
||
|
"impactScore": 1.4
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-347"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "1.0.0",
|
||
|
"versionEndExcluding": "2.0.8",
|
||
|
"matchCriteriaId": "29C4F347-1E27-4517-8E9D-E932B3A7F271"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "7.0.0",
|
||
|
"versionEndExcluding": "7.0.2",
|
||
|
"matchCriteriaId": "EFEA53FA-16E1-4CDB-933C-2F886CAB15DA"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.0.0",
|
||
|
"versionEndExcluding": "6.3.17",
|
||
|
"matchCriteriaId": "C85CEB11-2682-448D-852A-9EE113E54539"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.4.0",
|
||
|
"versionEndExcluding": "7.0.0",
|
||
|
"matchCriteriaId": "1725A170-7445-459F-A682-A9EA13470393"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.0.0",
|
||
|
"versionEndExcluding": "6.4.9",
|
||
|
"matchCriteriaId": "E23ACB3B-E74F-4AF6-B67B-7603ED113B36"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "7.0.0",
|
||
|
"versionEndExcluding": "7.0.4",
|
||
|
"matchCriteriaId": "30F10D70-1176-4119-BF1A-C2A5FCA386D4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.0.0",
|
||
|
"versionEndExcluding": "6.4.11",
|
||
|
"matchCriteriaId": "8C7EE382-AA93-4634-B48E-3BE9012EC96B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "7.0.0",
|
||
|
"versionEndExcluding": "7.0.4",
|
||
|
"matchCriteriaId": "69CF7A08-72CB-4CEC-9900-8B26180B2782"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://fortiguard.com/psirt/FG-IR-21-126",
|
||
|
"source": "psirt@fortinet.com",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|