A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-21-067 |
History
Fri, 20 Dec 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Dec 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use after free in Fortinet FortiManager, FortiAnalyzer allows attacker to execute unauthorized code or commands via <insert attack vector here> | A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device. |
Thu, 19 Dec 2024 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use after free in Fortinet FortiManager, FortiAnalyzer allows attacker to execute unauthorized code or commands via <insert attack vector here> | |
First Time appeared |
Fortinet
Fortinet fortianalyzer Fortinet fortimanager |
|
Weaknesses | CWE-416 | |
CPEs | cpe:2.3:o:fortinet:fortianalyzer:5.2.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.3.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.12:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortianalyzer Fortinet fortimanager |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2024-12-19T12:22:32.543Z
Updated: 2024-12-20T21:55:26.925Z
Reserved: 2021-05-11T21:19:05.181Z
Link: CVE-2021-32589
Vulnrichment
Updated: 2024-12-20T21:54:52.493Z
NVD
Status : Received
Published: 2024-12-19T13:15:05.707
Modified: 2024-12-19T17:15:07.167
Link: CVE-2021-32589
Redhat
No data.