mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
175 lines
7.0 KiB
JSON
175 lines
7.0 KiB
JSON
{
|
|
"id": "CVE-2021-32589",
|
|
"sourceIdentifier": "psirt@fortinet.com",
|
|
"published": "2024-12-19T13:15:05.707",
|
|
"lastModified": "2025-01-31T17:42:05.437",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad de Use After Free (CWE-416) en FortiManager versi\u00f3n 7.0.0, versi\u00f3n 6.4.5 y anteriores, versi\u00f3n 6.2.7 y anteriores, versi\u00f3n 6.0.10 y anteriores, versi\u00f3n 5.6.10 y anteriores, versi\u00f3n 5.4.7 y anteriores, versi\u00f3n 5.2.10 y anteriores, versi\u00f3n 5.0.12 y anteriores y FortiAnalyzer versi\u00f3n 7.0.0, versi\u00f3n 6.4.5 y anteriores, versi\u00f3n 6.2.7 y anteriores, versi\u00f3n 6.0.10 y anteriores, versi\u00f3n 5.6.10 y anteriores, versi\u00f3n 5.4.7 y anteriores, versi\u00f3n 5.3.11, versi\u00f3n 5.2.10 a 5.2.4 del daemon fgfmsd puede permitir que un atacante remoto no autenticado ejecute c\u00f3digo no autorizado como superusuario mediante el env\u00edo de una solicitud espec\u00edficamente manipulada al puerto fgfm del dispositivo de destino."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "psirt@fortinet.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 8.1,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.2,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "psirt@fortinet.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-416"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "5.2.4",
|
|
"versionEndExcluding": "5.6.11",
|
|
"matchCriteriaId": "DC678658-46C6-49D6-853F-488EB4C2950F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.0.0",
|
|
"versionEndExcluding": "6.0.11",
|
|
"matchCriteriaId": "093F543B-6709-4B77-87A6-7989B3EF1B2B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.2.0",
|
|
"versionEndExcluding": "6.2.8",
|
|
"matchCriteriaId": "E0F1A4F4-3123-4032-A82A-A4E1E2DFD2EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.4.0",
|
|
"versionEndExcluding": "6.4.6",
|
|
"matchCriteriaId": "23A36459-01FE-4ABC-8C5B-783408B43E22"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D7DC87E0-0C9F-4E65-B96E-7E91F71764AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "5.0.0",
|
|
"versionEndExcluding": "5.6.11",
|
|
"matchCriteriaId": "E17DB3C5-AB61-49E4-9281-27F41B565FF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.0.0",
|
|
"versionEndExcluding": "6.0.11",
|
|
"matchCriteriaId": "A817FD04-EEF8-40C9-AF7F-B9C1458226F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.2.0",
|
|
"versionEndExcluding": "6.2.8",
|
|
"matchCriteriaId": "C4A894BD-7AB4-4F10-819A-4DE3F9C961CC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.4.0",
|
|
"versionEndExcluding": "6.4.6",
|
|
"matchCriteriaId": "F3FC7F19-2794-4E8E-A93A-4031D94D2A7F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8A4E6379-A79E-4135-BAF1-D53E8F56798B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "4.0.0",
|
|
"versionEndExcluding": "5.3.7",
|
|
"matchCriteriaId": "F3AF186D-F8CF-4050-B41E-FE25825C7834"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.0.0",
|
|
"versionEndExcluding": "6.0.6",
|
|
"matchCriteriaId": "08ECB3CD-EAA3-488F-9711-85F88B80E2F1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-21-067",
|
|
"source": "psirt@fortinet.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |