A heap-based buffer overflow in the firmware signature verification function of FortiOS versions 7.0.1, 7.0.0, 6.4.0 through 6.4.6, 6.2.0 through 6.2.9, and 6.0.0 through 6.0.13 may allow an attacker to execute arbitrary code via specially crafted installation images.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-21-115 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
10 Dec 2021, 16:37
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://fortiguard.com/advisory/FG-IR-21-115 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
CWE | CWE-787 | |
CPE | cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate-200f:-:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate_1800f:-:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate-400e:-:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate-2600f:-:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate-600e:-:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate_7121f:-:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate_3300e:-:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate_40f:-:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate_2200e:-:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate-3500f:-:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate_60f:-:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate-1100e:-:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortigate_3600e:-:*:*:*:*:*:*:* |
08 Dec 2021, 19:26
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-08 19:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-36173
Mitre link : CVE-2021-36173
CVE.ORG link : CVE-2021-36173
JSON object : View
Products Affected
fortinet
- fortigate_40f
- fortigate_60f
- fortigate-200f
- fortigate-1100e
- fortigate_2200e
- fortigate-3500f
- fortigate_1800f
- fortigate-2600f
- fortios
- fortigate_3600e
- fortigate-600e
- fortigate_7121f
- fortigate-400e
- fortigate_3300e
CWE
CWE-787
Out-of-bounds Write