CVE-2021-32589
19.12.2024, 13:15
A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.Enginsight
Vendor | Product | Version |
---|---|---|
fortinet | fortianalyzer | 5.2.4 ≤ 𝑥 < 5.6.11 |
fortinet | fortianalyzer | 6.0.0 ≤ 𝑥 < 6.0.11 |
fortinet | fortianalyzer | 6.2.0 ≤ 𝑥 < 6.2.8 |
fortinet | fortianalyzer | 6.4.0 ≤ 𝑥 < 6.4.6 |
fortinet | fortianalyzer | 7.0.0 |
fortinet | fortimanager | 5.0.0 ≤ 𝑥 < 5.6.11 |
fortinet | fortimanager | 6.0.0 ≤ 𝑥 < 6.0.11 |
fortinet | fortimanager | 6.2.0 ≤ 𝑥 < 6.2.8 |
fortinet | fortimanager | 6.4.0 ≤ 𝑥 < 6.4.6 |
fortinet | fortimanager | 7.0.0 |
fortinet | fortiportal | 4.0.0 ≤ 𝑥 < 5.3.7 |
fortinet | fortiportal | 6.0.0 ≤ 𝑥 < 6.0.6 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration