CVE-2021-32589

A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*

History

31 Jan 2025, 17:42

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de Use After Free (CWE-416) en FortiManager versión 7.0.0, versión 6.4.5 y anteriores, versión 6.2.7 y anteriores, versión 6.0.10 y anteriores, versión 5.6.10 y anteriores, versión 5.4.7 y anteriores, versión 5.2.10 y anteriores, versión 5.0.12 y anteriores y FortiAnalyzer versión 7.0.0, versión 6.4.5 y anteriores, versión 6.2.7 y anteriores, versión 6.0.10 y anteriores, versión 5.6.10 y anteriores, versión 5.4.7 y anteriores, versión 5.3.11, versión 5.2.10 a 5.2.4 del daemon fgfmsd puede permitir que un atacante remoto no autenticado ejecute código no autorizado como superusuario mediante el envío de una solicitud específicamente manipulada al puerto fgfm del dispositivo de destino.
First Time Fortinet fortimanager
Fortinet
Fortinet fortianalyzer
Fortinet fortiportal
CPE cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*
References () https://fortiguard.fortinet.com/psirt/FG-IR-21-067 - () https://fortiguard.fortinet.com/psirt/FG-IR-21-067 - Vendor Advisory

19 Dec 2024, 17:15

Type Values Removed Values Added
Summary (en) A use after free in Fortinet FortiManager, FortiAnalyzer allows attacker to execute unauthorized code or commands via <insert attack vector here> (en) A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.

19 Dec 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-19 13:15

Updated : 2025-01-31 17:42


NVD link : CVE-2021-32589

Mitre link : CVE-2021-32589

CVE.ORG link : CVE-2021-32589


JSON object : View

Products Affected

fortinet

  • fortianalyzer
  • fortimanager
  • fortiportal
CWE
CWE-416

Use After Free