Description
A use of a broken or risky cryptographic algorithm vulnerability [CWE-327] in the Dynamic Tunnel Protocol of FortiWAN before 4.5.9 may allow an unauthenticated remote attacker to decrypt and forge protocol communication messages.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19433 | A use of a broken or risky cryptographic algorithm vulnerability [CWE-327] in the Dynamic Tunnel Protocol of FortiWAN before 4.5.9 may allow an unauthenticated remote attacker to decrypt and forge protocol communication messages. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-21-070 |
|
History
Fri, 25 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T13:33:43.236Z
Reserved: 2021-05-11T00:00:00.000Z
Link: CVE-2021-32593
Updated: 2024-08-03T23:25:30.890Z
Status : Modified
Published: 2022-04-06T10:15:07.983
Modified: 2024-11-21T06:07:20.437
Link: CVE-2021-32593
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD