Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-19429 | A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device. |
Solution
Please upgrade to FortiPortal version 6.0.6 or above Please upgrade to FortiPortal version 5.3.7 or above Please upgrade to FortiManager version 7.0.1 or above Please upgrade to FortiManager version 6.4.6 or above Please upgrade to FortiManager version 6.2.8 or above Please upgrade to FortiManager version 6.0.11 or above Please upgrade to FortiManager version 5.6.11 or above Please upgrade to FortiAnalyzer version 7.0.1 or above Please upgrade to FortiAnalyzer version 6.4.6 or above Please upgrade to FortiAnalyzer version 6.2.8 or above Please upgrade to FortiAnalyzer version 6.0.11 or above Please upgrade to FortiAnalyzer version 5.6.11 or above
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-21-067 |
![]() ![]() |
Fri, 31 Jan 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet fortiportal
|
|
CPEs | cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet fortiportal
|
Fri, 20 Dec 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Dec 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use after free in Fortinet FortiManager, FortiAnalyzer allows attacker to execute unauthorized code or commands via <insert attack vector here> | A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device. |
Thu, 19 Dec 2024 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use after free in Fortinet FortiManager, FortiAnalyzer allows attacker to execute unauthorized code or commands via <insert attack vector here> | |
First Time appeared |
Fortinet
Fortinet fortianalyzer Fortinet fortimanager |
|
Weaknesses | CWE-416 | |
CPEs | cpe:2.3:o:fortinet:fortianalyzer:5.2.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.3.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.12:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortianalyzer Fortinet fortimanager |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-12-20T21:55:26.925Z
Reserved: 2021-05-11T21:19:05.181Z
Link: CVE-2021-32589

Updated: 2024-12-20T21:54:52.493Z

Status : Analyzed
Published: 2024-12-19T13:15:05.707
Modified: 2025-01-31T17:42:05.437
Link: CVE-2021-32589

No data.

No data.