Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-43072


A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiAnalyzer version 7.0.2 and below, version 6.4.7 and below, version 6.2.9 and below, version 6.0.11 and below, version 5.6.11 and below, FortiManager version 7.0.2 and below, version 6.4.7 and below, version 6.2.9 and below, version 6.0.11 and below, version 5.6.11 and below, FortiOS version 7.0.0 through 7.0.4, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.x and FortiProxy version 7.0.0 through 7.0.3, 2.0.0 through 2.0.8, 1.2.x, 1.1.x and 1.0.x allows attacker to execute unauthorized code or commands via crafted CLI `execute restore image` and `execute certificate remote` operations with the tFTP protocol.


Published

2023-07-18T03:15:54.947

Last Modified

2024-11-21T06:28:38.490

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.7 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-120
  • Type: Primary
    CWE-120

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application fortinet fortianalyzer < 6.4.8 Yes
Application fortinet fortianalyzer < 7.0.3 Yes
Application fortinet fortimanager < 6.4.8 Yes
Application fortinet fortimanager < 7.0.3 Yes
Application fortinet fortiproxy < 2.0.9 Yes
Application fortinet fortiproxy < 7.0.4 Yes
Operating System fortinet fortios < 6.2.11 Yes
Operating System fortinet fortios < 6.4.9 Yes
Operating System fortinet fortios < 7.0.6 Yes

References