Vulnerabilites related to fortinet - fortios-6k7k
cve-2023-27997
Vulnerability from cvelistv5
Published
2023-06-13 08:41
Modified
2024-10-23 13:18
Summary
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.
Impacted products
Vendor Product Version
Fortinet FortiOS-6K7K Version: 7.0.10
Version: 7.0.5
Version: 6.4.12
Version: 6.4.10
Version: 6.4.8
Version: 6.4.6
Version: 6.4.2
Version: 6.2.9    6.2.13
Version: 6.2.6    6.2.7
Version: 6.2.4
Version: 6.0.12    6.0.16
Version: 6.0.10
Create a notification for this product.
   Fortinet FortiProxy Version: 7.2.0    7.2.3
Version: 7.0.0    7.0.9
Version: 2.0.0    2.0.12
Version: 1.2.0    1.2.13
Version: 1.1.0    1.1.6
Create a notification for this product.
   Fortinet FortiOS Version: 7.2.0    7.2.4
Version: 7.0.0    7.0.11
Version: 6.4.0    6.4.12
Version: 6.2.0    6.2.13
Version: 6.0.0    6.0.16
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T12:23:30.864Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://fortiguard.com/psirt/FG-IR-23-097",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-23-097",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-27997",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-23T13:18:08.089433Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2023-06-13",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-27997",
                     },
                     type: "kev",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-23T13:18:14.745Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "FortiOS-6K7K",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "7.0.10",
                  },
                  {
                     status: "affected",
                     version: "7.0.5",
                  },
                  {
                     status: "affected",
                     version: "6.4.12",
                  },
                  {
                     status: "affected",
                     version: "6.4.10",
                  },
                  {
                     status: "affected",
                     version: "6.4.8",
                  },
                  {
                     status: "affected",
                     version: "6.4.6",
                  },
                  {
                     status: "affected",
                     version: "6.4.2",
                  },
                  {
                     lessThanOrEqual: "6.2.13",
                     status: "affected",
                     version: "6.2.9",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.2.7",
                     status: "affected",
                     version: "6.2.6",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "6.2.4",
                  },
                  {
                     lessThanOrEqual: "6.0.16",
                     status: "affected",
                     version: "6.0.12",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "6.0.10",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "FortiProxy",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "7.2.3",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "7.0.9",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "2.0.12",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "1.2.13",
                     status: "affected",
                     version: "1.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "1.1.6",
                     status: "affected",
                     version: "1.1.0",
                     versionType: "semver",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "FortiOS",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "7.2.4",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "7.0.11",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.4.12",
                     status: "affected",
                     version: "6.4.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.2.13",
                     status: "affected",
                     version: "6.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.0.16",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.2,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:R",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "Execute unauthorized code or commands",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-13T08:41:47.415Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-23-097",
               url: "https://fortiguard.com/psirt/FG-IR-23-097",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiOS-6K7K version 7.0.12 or above\r\nPlease upgrade to FortiOS-6K7K version 6.4.13 or above\r\nPlease upgrade to FortiOS-6K7K version 6.2.15 or above\r\nPlease upgrade to FortiOS-6K7K version 6.0.17 or above\r\nPlease upgrade to FortiProxy version 7.2.4 or above\r\nPlease upgrade to FortiProxy version 7.0.10 or above\r\nPlease upgrade to FortiOS version 7.4.0 or above\r\nPlease upgrade to FortiOS version 7.2.5 or above\r\nPlease upgrade to FortiOS version 7.0.12 or above\r\nPlease upgrade to FortiOS version 6.4.13 or above\r\nPlease upgrade to FortiOS version 6.2.14 or above\r\nPlease upgrade to FortiOS version 6.0.17 or above",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2023-27997",
      datePublished: "2023-06-13T08:41:47.415Z",
      dateReserved: "2023-03-09T10:09:33.119Z",
      dateUpdated: "2024-10-23T13:18:14.745Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-42757
Vulnerability from cvelistv5
Published
2021-12-08 11:01
Modified
2024-08-04 03:38
Summary
A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments.
References
https://fortiguard.com/advisory/FG-IR-21-173x_refsource_CONFIRM
Impacted products
Vendor Product Version
Fortinet Fortinet FortiOS Version: FortiOS before 6.4.7, FortiOS 7.0.0 through 7.0.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T03:38:50.116Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/advisory/FG-IR-21-173",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Fortinet FortiOS",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "FortiOS before 6.4.7, FortiOS 7.0.0 through 7.0.2",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "PROOF_OF_CONCEPT",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  remediationLevel: "UNAVAILABLE",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 6.3,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Execute unauthorized code or commands",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-08T11:01:11",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://fortiguard.com/advisory/FG-IR-21-173",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@fortinet.com",
               ID: "CVE-2021-42757",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Fortinet FortiOS",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "FortiOS before 6.4.7, FortiOS 7.0.0 through 7.0.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Fortinet",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 6.3,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  userInteraction: "None",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Execute unauthorized code or commands",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://fortiguard.com/advisory/FG-IR-21-173",
                     refsource: "CONFIRM",
                     url: "https://fortiguard.com/advisory/FG-IR-21-173",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2021-42757",
      datePublished: "2021-12-08T11:01:11",
      dateReserved: "2021-10-20T00:00:00",
      dateUpdated: "2024-08-04T03:38:50.116Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

var-202112-0338
Vulnerability from variot

A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments. (DoS) It may be in a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0338",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "fortios-6k7k",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.2.8",
         },
         {
            model: "fortios",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "7.0.0",
         },
         {
            model: "fortiswitch",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.9",
         },
         {
            model: "fortianalyzer",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "7.0.0",
         },
         {
            model: "fortiadc",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.1.5",
         },
         {
            model: "fortios",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.0.13",
         },
         {
            model: "fortindr",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "1.1.0",
         },
         {
            model: "fortios-6k7k",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.6",
         },
         {
            model: "fortiadc",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "6.2.0",
         },
         {
            model: "fortios-6k7k",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.2",
         },
         {
            model: "fortivoice",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.0",
         },
         {
            model: "fortiweb",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.3.16",
         },
         {
            model: "fortiadc",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.2.2",
         },
         {
            model: "fortiweb",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "5.0.0",
         },
         {
            model: "fortirecorder",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.0",
         },
         {
            model: "fortimanager",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "6.0.0",
         },
         {
            model: "fortimail",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.2.7",
         },
         {
            model: "fortiadc",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "5.0.0",
         },
         {
            model: "fortimail",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "5.4.0",
         },
         {
            model: "fortios",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.2.9",
         },
         {
            model: "fortivoice",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "6.0.0",
         },
         {
            model: "fortios",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "6.2.0",
         },
         {
            model: "fortirecorder",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "2.6.0",
         },
         {
            model: "fortirecorder",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.2",
         },
         {
            model: "fortimail",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "7.0.0",
         },
         {
            model: "fortivoice",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.0.10",
         },
         {
            model: "fortiswitch",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "7.0.0",
         },
         {
            model: "fortiproxy",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "2.0.7",
         },
         {
            model: "fortiportal",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "5.0.0",
         },
         {
            model: "fortimanager",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "7.0.2",
         },
         {
            model: "fortios",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "5.0.0",
         },
         {
            model: "fortiswitch",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "7.0.3",
         },
         {
            model: "fortiproxy",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "1.0.0",
         },
         {
            model: "fortios",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.0",
         },
         {
            model: "fortiproxy",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "7.0.1",
         },
         {
            model: "fortiportal",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.0.10",
         },
         {
            model: "fortimail",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.6",
         },
         {
            model: "fortimanager",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.7",
         },
         {
            model: "fortianalyzer",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "6.0.0",
         },
         {
            model: "fortimanager",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "7.0.0",
         },
         {
            model: "fortindr",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "1.5.2",
         },
         {
            model: "fortirecorder",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.0.10",
         },
         {
            model: "fortios",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "7.0.2",
         },
         {
            model: "fortianalyzer",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "7.0.2",
         },
         {
            model: "fortiproxy",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "7.0.0",
         },
         {
            model: "fortimail",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.0",
         },
         {
            model: "fortios",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.7",
         },
         {
            model: "fortiswitch",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "6.0.0",
         },
         {
            model: "fortianalyzer",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.7",
         },
         {
            model: "fortivoice",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.4",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.1",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.0",
         },
         {
            model: "fortimail",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "7.0.2",
         },
         {
            model: "fortimanager",
            scope: null,
            trust: 0.8,
            vendor: "フォーティネット",
            version: null,
         },
         {
            model: "fortios",
            scope: null,
            trust: 0.8,
            vendor: "フォーティネット",
            version: null,
         },
         {
            model: "fortianalyzer",
            scope: null,
            trust: 0.8,
            vendor: "フォーティネット",
            version: null,
         },
         {
            model: "fortiweb",
            scope: null,
            trust: 0.8,
            vendor: "フォーティネット",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-016008",
         },
         {
            db: "NVD",
            id: "CVE-2021-42757",
         },
      ],
   },
   cve: "CVE-2021-42757",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2021-42757",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "VHN-403819",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  id: "CVE-2021-42757",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 2,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "OTHER",
                  availabilityImpact: "High",
                  baseScore: 6.7,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "JVNDB-2021-016008",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2021-42757",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "psirt@fortinet.com",
                  id: "CVE-2021-42757",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2021-42757",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202112-559",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-403819",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-403819",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-016008",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-559",
         },
         {
            db: "NVD",
            id: "CVE-2021-42757",
         },
         {
            db: "NVD",
            id: "CVE-2021-42757",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments. (DoS) It may be in a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-42757",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-016008",
         },
         {
            db: "VULHUB",
            id: "VHN-403819",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-42757",
            trust: 3.3,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-016008",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-559",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-403819",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-403819",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-016008",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-559",
         },
         {
            db: "NVD",
            id: "CVE-2021-42757",
         },
      ],
   },
   id: "VAR-202112-0338",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-403819",
         },
      ],
      trust: 0.36984128000000005,
   },
   last_update_date: "2024-11-23T22:20:42.629000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "FG-IR-21-173",
            trust: 0.8,
            url: "https://www.fortiguard.com/psirt/FG-IR-21-173",
         },
         {
            title: "Fortinet FortiOS Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173877",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-016008",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-559",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Classic buffer overflow (CWE-120) [NVD evaluation ]",
            trust: 0.8,
         },
         {
            problemtype: "CWE-120",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-403819",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-016008",
         },
         {
            db: "NVD",
            id: "CVE-2021-42757",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://fortiguard.com/advisory/fg-ir-21-173",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-42757",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/fortios-buffer-overflow-via-tftp-client-library-37026",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-403819",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-016008",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-559",
         },
         {
            db: "NVD",
            id: "CVE-2021-42757",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-403819",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-016008",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-559",
         },
         {
            db: "NVD",
            id: "CVE-2021-42757",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-12-08T00:00:00",
            db: "VULHUB",
            id: "VHN-403819",
         },
         {
            date: "2022-12-05T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-016008",
         },
         {
            date: "2021-12-07T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202112-559",
         },
         {
            date: "2021-12-08T11:15:11.840000",
            db: "NVD",
            id: "CVE-2021-42757",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-12-09T00:00:00",
            db: "VULHUB",
            id: "VHN-403819",
         },
         {
            date: "2022-12-05T06:18:00",
            db: "JVNDB",
            id: "JVNDB-2021-016008",
         },
         {
            date: "2021-12-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202112-559",
         },
         {
            date: "2024-11-21T06:28:06.653000",
            db: "NVD",
            id: "CVE-2021-42757",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202112-559",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "FortiOS  of  TFTP  client library and  FortiOS  Classic buffer overflow vulnerability in",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-016008",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202112-559",
         },
      ],
      trust: 0.6,
   },
}

Vulnerability from fkie_nvd
Published
2021-12-08 11:15
Modified
2024-11-21 06:28
Summary
A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6DD5253-F76E-4799-BB45-79D7B7ACFFB1",
                     versionEndIncluding: "6.1.5",
                     versionStartIncluding: "5.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "075C4223-7586-4799-AFA8-7B578BD144B5",
                     versionEndIncluding: "6.2.2",
                     versionStartIncluding: "6.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF9AE101-566A-4460-AA97-18288BBD7639",
                     versionEndIncluding: "6.4.7",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCEB8E5F-BBF2-4E6E-91C6-AA47E2CAD022",
                     versionEndIncluding: "7.0.2",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E2DC5CE-ED48-48B7-8654-7B29A65A7454",
                     versionEndIncluding: "6.2.7",
                     versionStartIncluding: "5.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0A5C345-7055-4F18-AE77-FF1DBE41AB89",
                     versionEndIncluding: "6.4.6",
                     versionStartIncluding: "6.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "43038EC9-6FD3-488C-8CA3-8B4A705C3E11",
                     versionEndIncluding: "7.0.2",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "958C238F-B3DD-41A7-801D-0C39143A5E09",
                     versionEndIncluding: "6.4.7",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C5772DB-7F52-479C-914D-778552395990",
                     versionEndIncluding: "7.0.2",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortindr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49E4A60-2FA0-4298-BF2E-53C86AF21BEC",
                     versionEndIncluding: "1.5.2",
                     versionStartIncluding: "1.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortios-6k7k:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEE493CA-7BE8-454A-82FD-11DB82D8FC3A",
                     versionEndIncluding: "6.2.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortios-6k7k:6.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "59BD8EE9-6F94-4EA5-B22B-1B446A15F2A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortios-6k7k:6.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "50BDB150-8E02-427D-A9FC-C7C3C90F0584",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D4A0E2F-41C7-4AFB-AC6D-83E7B1A5FC70",
                     versionEndIncluding: "6.0.10",
                     versionStartIncluding: "5.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEBD9074-C3A5-437E-AC44-C41E4B001980",
                     versionEndIncluding: "2.0.7",
                     versionStartIncluding: "1.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiproxy:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D909C90B-E136-4E8E-B551-FE0369172C1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiproxy:7.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBCB4E87-0AEC-487E-8FAD-E8F647DA21D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "70E9D9A8-EFF1-4ABE-A04D-FD983443DD3A",
                     versionEndIncluding: "6.0.10",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8611A25-64A1-4BCE-AA46-E47DFD607CB2",
                     versionEndIncluding: "6.4.4",
                     versionStartIncluding: "6.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FEA2E8B-78B6-40AA-9201-BDF4838950CC",
                     versionEndIncluding: "6.3.16",
                     versionStartIncluding: "5.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "74A92A08-E6F6-4522-A6DA-061950AD3525",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6A3D2C4-C3FA-4E12-9156-DAFEA4E00BCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE1C5491-6C94-48A9-8D59-5162E576E54A",
                     versionEndIncluding: "6.0.13",
                     versionStartIncluding: "5.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4C0308D-8E52-456B-BFC2-62D4C1E9BDC3",
                     versionEndIncluding: "6.2.9",
                     versionStartIncluding: "6.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D183D979-7F73-4D02-91B7-D0C93DE55A8F",
                     versionEndIncluding: "6.4.7",
                     versionStartIncluding: "6.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E9D423-721A-482B-BA6B-52E4D8C07C58",
                     versionEndIncluding: "7.0.2",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortirecorder_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E33B56-1975-4B78-A157-E0EADB3BC1B7",
                     versionEndIncluding: "6.0.10",
                     versionStartIncluding: "2.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortirecorder_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CB7DEA7-E461-43B0-98EB-CE436DE87D98",
                     versionEndIncluding: "6.4.2",
                     versionStartIncluding: "6.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6E5A33E-F744-4CC0-ABA0-D1734845AFBB",
                     versionEndIncluding: "6.4.9",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB3C99AC-DCA1-44A0-9671-F424109A6038",
                     versionEndIncluding: "7.0.3",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments.",
      },
      {
         lang: "es",
         value: "Un desbordamiento de búfer [CWE-121] en la biblioteca del cliente TFTP de FortiOS versiones anteriores a 6.4.7 y FortiOS versiones 7.0.0 hasta 7.0.2, puede permitir a un atacante local autenticado lograr una ejecución de código arbitrario por medio de argumentos de línea de comandos especialmente diseñados",
      },
   ],
   id: "CVE-2021-42757",
   lastModified: "2024-11-21T06:28:06.653",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-12-08T11:15:11.840",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/advisory/FG-IR-21-173",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/advisory/FG-IR-21-173",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}