Lucene search

K
cveFortinetCVE-2021-42756
HistoryFeb 16, 2023 - 7:15 p.m.

CVE-2021-42756

2023-02-1619:15:11
CWE-787
CWE-121
fortinet
web.nvd.nist.gov
44
cve-2021-42756
fortiweb
buffer overflow
cwe-121
remote code execution
nvd
security vulnerability

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.002

Percentile

55.1%

Multiple stack-based buffer overflow vulnerabilitiesย [CWE-121] in the proxy daemon of FortiWeb 5.xย all versions, 6.0.7 and below, 6.1.2 and below, 6.2.6 and below, 6.3.16 and below, 6.4ย all versions may allow an unauthenticated remote attacker to achieve arbitrary code execution via specifically crafted HTTP requests.

Affected configurations

Nvd
Node
fortinetfortiwebRange5.6.0โ€“6.0.8
OR
fortinetfortiwebRange6.1.0โ€“6.1.3
OR
fortinetfortiwebRange6.2.0โ€“6.2.7
OR
fortinetfortiwebRange6.3.0โ€“6.3.17
OR
fortinetfortiwebRange6.4.0โ€“6.4.2
VendorProductVersionCPE
fortinetfortiweb*cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiWeb",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.3.0",
        "lessThanOrEqual": "6.3.16",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.1.0",
        "lessThanOrEqual": "6.1.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.0.0",
        "lessThanOrEqual": "6.0.7",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.9.0",
        "lessThanOrEqual": "5.9.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.8.5",
        "lessThanOrEqual": "5.8.7",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.8.0",
        "lessThanOrEqual": "5.8.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.7.0",
        "lessThanOrEqual": "5.7.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.6.0",
        "lessThanOrEqual": "5.6.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.8.0",
        "lessThan": "5.8.*",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.7.0",
        "lessThan": "5.7.*",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.6.0",
        "lessThan": "5.6.*",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.002

Percentile

55.1%