Lucene search

K
cve[email protected]CVE-2021-42755
HistoryJul 18, 2022 - 5:15 p.m.

CVE-2021-42755

2022-07-1817:15:08
CWE-190
web.nvd.nist.gov
41
10
cve-2021-42755
integer overflow
fortiswitch
fortirecorder
fortios
fortiproxy
fortivoiceenterprise
cwe-190
vulnerability
nvd
denial of service

4.3 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

4.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.0%

An integer overflow / wraparound vulnerability [CWE-190] in FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10 and below; FortiOS 7.0.2 and below, 6.4.8 and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0.0, 2.0.6 and below, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 and below, 6.0.10 and below dhcpd daemon may allow an unauthenticated and network adjacent attacker to crash the dhcpd deamon, resulting in potential denial of service.

Affected configurations

NVD
Node
fortinetfortiproxyRange1.0.01.0.7
OR
fortinetfortiproxyRange1.1.01.1.6
OR
fortinetfortiproxyRange1.2.01.2.13
OR
fortinetfortiproxyRange2.0.02.0.6
OR
fortinetfortiproxyMatch7.0.0
OR
fortinetfortivoiceMatch5.3.0
OR
fortinetfortivoiceMatch5.3.1
OR
fortinetfortivoiceMatch5.3.2
OR
fortinetfortivoiceMatch5.3.3
OR
fortinetfortivoiceMatch5.3.4
OR
fortinetfortivoiceMatch5.3.5
OR
fortinetfortivoiceMatch5.3.6
OR
fortinetfortivoiceMatch5.3.7
OR
fortinetfortivoiceMatch5.3.8
OR
fortinetfortivoiceMatch5.3.10
OR
fortinetfortivoiceMatch5.3.11
OR
fortinetfortivoiceMatch5.3.12
OR
fortinetfortivoiceMatch5.3.13
OR
fortinetfortivoiceMatch5.3.14
OR
fortinetfortivoiceMatch5.3.15
OR
fortinetfortivoiceMatch5.3.16
OR
fortinetfortivoiceMatch5.3.17
OR
fortinetfortivoiceMatch5.3.18
OR
fortinetfortivoiceMatch5.3.19
OR
fortinetfortivoiceMatch5.3.20
OR
fortinetfortivoiceMatch5.3.21
OR
fortinetfortivoiceMatch5.3.22
OR
fortinetfortivoiceMatch5.3.23
OR
fortinetfortivoiceMatch5.3.24
OR
fortinetfortivoiceMatch5.3.25
OR
fortinetfortivoiceMatch5.3.26
OR
fortinetfortivoiceMatch6.0.0
OR
fortinetfortivoiceMatch6.0.1
OR
fortinetfortivoiceMatch6.0.2
OR
fortinetfortivoiceMatch6.0.3
OR
fortinetfortivoiceMatch6.0.4
OR
fortinetfortivoiceMatch6.0.5
OR
fortinetfortivoiceMatch6.0.6
OR
fortinetfortivoiceMatch6.0.7
OR
fortinetfortivoiceMatch6.0.8
OR
fortinetfortivoiceMatch6.0.9
OR
fortinetfortivoiceMatch6.0.10
OR
fortinetfortivoiceMatch6.4.0
OR
fortinetfortivoiceMatch6.4.1
OR
fortinetfortivoiceMatch6.4.2
OR
fortinetfortivoiceMatch6.4.3
OR
fortinetfortiosMatch5.4.0
OR
fortinetfortiosMatch5.4.1
OR
fortinetfortiosMatch5.4.2
OR
fortinetfortiosMatch5.4.3
OR
fortinetfortiosMatch5.4.4
OR
fortinetfortiosMatch5.4.5
OR
fortinetfortiosMatch5.4.6
OR
fortinetfortiosMatch5.4.7
OR
fortinetfortiosMatch5.4.8
OR
fortinetfortiosMatch5.4.9
OR
fortinetfortiosMatch5.4.10
OR
fortinetfortiosMatch5.4.11
OR
fortinetfortiosMatch5.4.12
OR
fortinetfortiosMatch5.4.13
OR
fortinetfortiosMatch5.6.0
OR
fortinetfortiosMatch5.6.1
OR
fortinetfortiosMatch5.6.2
OR
fortinetfortiosMatch5.6.3
OR
fortinetfortiosMatch5.6.4
OR
fortinetfortiosMatch5.6.5
OR
fortinetfortiosMatch5.6.6
OR
fortinetfortiosMatch5.6.7
OR
fortinetfortiosMatch5.6.8
OR
fortinetfortiosMatch5.6.9
OR
fortinetfortiosMatch5.6.10
OR
fortinetfortiosMatch5.6.11
OR
fortinetfortiosMatch5.6.12
OR
fortinetfortiosMatch5.6.13
OR
fortinetfortiosMatch5.6.14
OR
fortinetfortiosMatch6.0.0
OR
fortinetfortiosMatch6.0.1
OR
fortinetfortiosMatch6.0.2
OR
fortinetfortiosMatch6.0.3
OR
fortinetfortiosMatch6.0.4
OR
fortinetfortiosMatch6.0.5
OR
fortinetfortiosMatch6.0.6
OR
fortinetfortiosMatch6.0.7
OR
fortinetfortiosMatch6.0.8
OR
fortinetfortiosMatch6.0.9
OR
fortinetfortiosMatch6.0.10
OR
fortinetfortiosMatch6.0.11
OR
fortinetfortiosMatch6.0.12
OR
fortinetfortiosMatch6.0.13
OR
fortinetfortiosMatch6.0.14
OR
fortinetfortiosMatch6.2.0
OR
fortinetfortiosMatch6.2.1
OR
fortinetfortiosMatch6.2.2
OR
fortinetfortiosMatch6.2.3
OR
fortinetfortiosMatch6.2.4
OR
fortinetfortiosMatch6.2.5
OR
fortinetfortiosMatch6.2.6
OR
fortinetfortiosMatch6.2.7
OR
fortinetfortiosMatch6.2.8
OR
fortinetfortiosMatch6.2.9
OR
fortinetfortiosMatch6.2.10
OR
fortinetfortiosMatch6.4.0
OR
fortinetfortiosMatch6.4.1
OR
fortinetfortiosMatch6.4.2
OR
fortinetfortiosMatch6.4.3
OR
fortinetfortiosMatch6.4.4
OR
fortinetfortiosMatch6.4.5
OR
fortinetfortiosMatch6.4.6
OR
fortinetfortiosMatch6.4.7
OR
fortinetfortiosMatch7.0.0
OR
fortinetfortiosMatch7.0.1
OR
fortinetfortiosMatch7.0.2
OR
fortinetfortirecorder_firmwareMatch6.0.0
OR
fortinetfortirecorder_firmwareMatch6.0.1
OR
fortinetfortirecorder_firmwareMatch6.0.2
OR
fortinetfortirecorder_firmwareMatch6.0.3
OR
fortinetfortirecorder_firmwareMatch6.0.4
OR
fortinetfortirecorder_firmwareMatch6.0.5
OR
fortinetfortirecorder_firmwareMatch6.0.6
OR
fortinetfortirecorder_firmwareMatch6.0.7
OR
fortinetfortirecorder_firmwareMatch6.0.8
OR
fortinetfortirecorder_firmwareMatch6.0.9
OR
fortinetfortirecorder_firmwareMatch6.0.10
OR
fortinetfortirecorder_firmwareMatch6.4.0
OR
fortinetfortirecorder_firmwareMatch6.4.1
OR
fortinetfortirecorder_firmwareMatch6.4.2
OR
fortinetfortiswitchRange6.0.06.0.7
OR
fortinetfortiswitchRange6.2.06.2.7
OR
fortinetfortiswitchRange6.4.06.4.9
OR
fortinetfortiswitchRange7.0.07.0.2

CNA Affected

[
  {
    "product": "Fortinet FortiSwitch, FortiRecorder, FortiVoiceEnterprise, FortiOS, FortiProxy",
    "vendor": "Fortinet",
    "versions": [
      {
        "status": "affected",
        "version": "FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10 and below; FortiOS 7.0.2 and below, 6.4.8 and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0.0, 2.0.6 and below, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 and below, 6.0.10 and below"
      }
    ]
  }
]

Social References

More

4.3 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

4.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.0%

Related for CVE-2021-42755