A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-19429 A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.
Fixes

Solution

Please upgrade to FortiPortal version 6.0.6 or above Please upgrade to FortiPortal version 5.3.7 or above Please upgrade to FortiManager version 7.0.1 or above Please upgrade to FortiManager version 6.4.6 or above Please upgrade to FortiManager version 6.2.8 or above Please upgrade to FortiManager version 6.0.11 or above Please upgrade to FortiManager version 5.6.11 or above Please upgrade to FortiAnalyzer version 7.0.1 or above Please upgrade to FortiAnalyzer version 6.4.6 or above Please upgrade to FortiAnalyzer version 6.2.8 or above Please upgrade to FortiAnalyzer version 6.0.11 or above Please upgrade to FortiAnalyzer version 5.6.11 or above


Workaround

No workaround given by the vendor.

History

Sat, 01 Feb 2025 03:00:00 +0900

Type Values Removed Values Added
First Time appeared Fortinet fortiportal
CPEs cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*
Vendors & Products Fortinet fortiportal

Sat, 21 Dec 2024 07:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Dec 2024 01:30:00 +0900

Type Values Removed Values Added
Description A use after free in Fortinet FortiManager, FortiAnalyzer allows attacker to execute unauthorized code or commands via <insert attack vector here> A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.

Thu, 19 Dec 2024 21:45:00 +0900

Type Values Removed Values Added
Description A use after free in Fortinet FortiManager, FortiAnalyzer allows attacker to execute unauthorized code or commands via <insert attack vector here>
First Time appeared Fortinet
Fortinet fortianalyzer
Fortinet fortimanager
Weaknesses CWE-416
CPEs cpe:2.3:o:fortinet:fortianalyzer:5.2.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.2.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.2.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.2.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.2.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.2.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.2.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.3.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.4.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.4.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.6.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.6.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.6.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.6.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.6.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.6.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.6.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.6.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.6.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.6.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:5.6.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.2.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.2.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.2.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.2.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.2.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.2.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.2.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.4.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.4.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.6.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.6.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.6.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.6.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.6.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.6.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.6.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.6.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.6.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.6.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:5.6.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortianalyzer
Fortinet fortimanager
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-12-20T21:55:26.925Z

Reserved: 2021-05-11T21:19:05.181Z

Link: CVE-2021-32589

cve-icon Vulnrichment

Updated: 2024-12-20T21:54:52.493Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-19T13:15:05.707

Modified: 2025-01-31T17:42:05.437

Link: CVE-2021-32589

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses