The use of a cryptographically weak pseudo-random number generator in the password reset feature of FortiPortal before 6.0.6 may allow a remote unauthenticated attacker to predict parts of or the whole newly generated password within a given time frame.
References
History

Fri, 25 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published: 2022-03-01T18:05:10

Updated: 2024-10-25T13:35:25.926Z

Reserved: 2021-07-06T00:00:00

Link: CVE-2021-36171

cve-icon Vulnrichment

Updated: 2024-08-04T00:47:43.855Z

cve-icon NVD

Status : Analyzed

Published: 2022-03-01T18:15:08.337

Modified: 2022-03-09T13:58:24.373

Link: CVE-2021-36171

cve-icon Redhat

No data.