Lucene search

K
cveFortinetCVE-2021-43076
HistorySep 06, 2022 - 4:15 p.m.

CVE-2021-43076

2022-09-0616:15:08
CWE-269
fortinet
web.nvd.nist.gov
38
3
cve-2021-43076
cwe-269
fortiadc
vulnerability
privilege management
shell access

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

6.2

Confidence

High

EPSS

0.001

Percentile

38.6%

An improper privilege management vulnerability [CWE-269] in FortiADC versions 6.2.1 and below, 6.1.5 and below, 6.0.4 and below, 5.4.5 and below and 5.3.7 and below may allow a remote authenticated attacker with restricted user profile to modify the system files using the shell access.

Affected configurations

Nvd
Node
fortinetfortiadcRange5.3.0–5.3.7
OR
fortinetfortiadcRange5.4.0–5.4.5
OR
fortinetfortiadcRange6.0.0–6.0.4
OR
fortinetfortiadcRange6.1.0–6.1.5
OR
fortinetfortiadcMatch6.2.0
OR
fortinetfortiadcMatch6.2.1
VendorProductVersionCPE
fortinetfortiadc*cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*
fortinetfortiadc6.2.0cpe:2.3:a:fortinet:fortiadc:6.2.0:*:*:*:*:*:*:*
fortinetfortiadc6.2.1cpe:2.3:a:fortinet:fortiadc:6.2.1:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "FortiADC",
    "vendor": "Fortinet",
    "versions": [
      {
        "status": "affected",
        "version": "FortiADC 6.2.1, 6.2.0, 6.1.5, 6.1.4, 6.1.3, 6.1.2, 6.1.1, 6.1.0, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0, 5.4.5, 5.4.4, 5.4.3, 5.4.2, 5.4.1, 5.4.0, 5.3.7, 5.3.6, 5.3.5, 5.3.4, 5.3.3, 5.3.2, 5.3.1, 5.3.0"
      }
    ]
  }
]

Social References

More

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

6.2

Confidence

High

EPSS

0.001

Percentile

38.6%

Related for CVE-2021-43076