CVE-2021-36173

A heap-based buffer overflow in the firmware signature verification function of FortiOS versions 7.0.1, 7.0.0, 6.4.0 through 6.4.6, 6.2.0 through 6.2.9, and 6.0.0 through 6.0.13 may allow an attacker to execute arbitrary code via specially crafted installation images.
References
Link Resource
https://fortiguard.com/advisory/FG-IR-21-115 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:*
OR cpe:2.3:h:fortinet:fortigate-1100e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-200f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-2600f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-3500f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-400e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-600e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_1800f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_2200e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_3300e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_3600e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_40f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_60f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_7121f:-:*:*:*:*:*:*:*

History

10 Dec 2021, 16:37

Type Values Removed Values Added
References (CONFIRM) https://fortiguard.com/advisory/FG-IR-21-115 - (CONFIRM) https://fortiguard.com/advisory/FG-IR-21-115 - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 8.8
CWE CWE-787
CPE cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-200f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_1800f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-400e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-2600f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-600e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_7121f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_3300e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_40f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_2200e:-:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-3500f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_60f:-:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-1100e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_3600e:-:*:*:*:*:*:*:*

08 Dec 2021, 19:26

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-08 19:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-36173

Mitre link : CVE-2021-36173

CVE.ORG link : CVE-2021-36173


JSON object : View

Products Affected

fortinet

  • fortigate_40f
  • fortigate_60f
  • fortigate-200f
  • fortigate-1100e
  • fortigate_2200e
  • fortigate-3500f
  • fortigate_1800f
  • fortigate-2600f
  • fortios
  • fortigate_3600e
  • fortigate-600e
  • fortigate_7121f
  • fortigate-400e
  • fortigate_3300e
CWE
CWE-787

Out-of-bounds Write