Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-36171


The use of a cryptographically weak pseudo-random number generator in the password reset feature of FortiPortal before 6.0.6 may allow a remote unauthenticated attacker to predict parts of or the whole newly generated password within a given time frame.


Published

2022-03-01T18:15:08.337

Last Modified

2024-11-21T06:13:15.030

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.1 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-338

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application fortinet fortiportal ≤ 4.0.4 Yes
Application fortinet fortiportal ≤ 4.1.2 Yes
Application fortinet fortiportal ≤ 4.2.4 Yes
Application fortinet fortiportal ≤ 5.0.3 Yes
Application fortinet fortiportal ≤ 5.1.2 Yes
Application fortinet fortiportal < 5.2.7 Yes
Application fortinet fortiportal < 5.3.7 Yes
Application fortinet fortiportal < 6.0.6 Yes

References