CVE-2021-32589

A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
fortinetCNA
7.7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
VendorProductVersion
fortinetfortianalyzer
5.2.4 ≤
𝑥
< 5.6.11
fortinetfortianalyzer
6.0.0 ≤
𝑥
< 6.0.11
fortinetfortianalyzer
6.2.0 ≤
𝑥
< 6.2.8
fortinetfortianalyzer
6.4.0 ≤
𝑥
< 6.4.6
fortinetfortianalyzer
7.0.0
fortinetfortimanager
5.0.0 ≤
𝑥
< 5.6.11
fortinetfortimanager
6.0.0 ≤
𝑥
< 6.0.11
fortinetfortimanager
6.2.0 ≤
𝑥
< 6.2.8
fortinetfortimanager
6.4.0 ≤
𝑥
< 6.4.6
fortinetfortimanager
7.0.0
fortinetfortiportal
4.0.0 ≤
𝑥
< 5.3.7
fortinetfortiportal
6.0.0 ≤
𝑥
< 6.0.6
𝑥
= Vulnerable software versions