fkie_cve-2021-43204
Vulnerability from fkie_nvd
Published
2021-12-09 09:15
Modified
2024-11-21 06:28
Severity ?
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Summary
A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@fortinet.com | https://fortiguard.com/advisory/FG-IR-21-167 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/advisory/FG-IR-21-167 | Patch, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fortinet | forticlient | * | |
| fortinet | forticlient | * | |
| fortinet | forticlient | * | |
| fortinet | forticlient | * | |
| fortinet | forticlient | * | |
| fortinet | forticlient | 4.0.1 | |
| fortinet | forticlient | 4.0.2 | |
| fortinet | forticlient | 4.0.3 | |
| fortinet | forticlient | 4.0.4 | |
| fortinet | forticlient | 4.1.0 | |
| fortinet | forticlient | 4.1.1 | |
| fortinet | forticlient | 4.1.2 | |
| fortinet | forticlient | 4.1.3 | |
| fortinet | forticlient | 4.2.0 | |
| fortinet | forticlient | 4.2.1 | |
| fortinet | forticlient | 4.2.2 | |
| fortinet | forticlient | 4.2.3 | |
| fortinet | forticlient | 4.2.4 | |
| fortinet | forticlient | 4.2.5 | |
| fortinet | forticlient | 4.2.6 | |
| fortinet | forticlient | 4.2.7 | |
| fortinet | forticlient | 4.3.0 | |
| fortinet | forticlient | 4.3.1 | |
| fortinet | forticlient | 4.3.2 | |
| fortinet | forticlient | 4.3.3 | |
| fortinet | forticlient | 4.3.4 | |
| fortinet | forticlient | 4.3.5 | |
| fortinet | forticlient | 5.2.0 | |
| fortinet | forticlient | 5.2.1 | |
| fortinet | forticlient | 5.2.2 | |
| fortinet | forticlient | 5.2.3 | |
| fortinet | forticlient | 5.2.4 | |
| fortinet | forticlient | 5.2.5 | |
| fortinet | forticlient | 5.2.6 | |
| fortinet | forticlient | 6.4.0 | |
| fortinet | forticlient | 6.4.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "C862F0D6-7BA9-4064-8536-D3BF549F0B52",
"versionEndIncluding": "5.0.11",
"versionStartIncluding": "5.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "A7941A14-836D-4016-B910-5292AA79D60D",
"versionEndIncluding": "5.4.5",
"versionStartIncluding": "5.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "14570EAA-2D79-45DC-BABD-0174658C8738",
"versionEndIncluding": "5.6.6",
"versionStartIncluding": "5.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "99B02B5E-89EF-46E5-8EC4-98AC8FB5CAFC",
"versionEndIncluding": "6.0.10",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "C5601CD7-A7CE-4FC5-A635-B20B415DC8C4",
"versionEndIncluding": "6.2.9",
"versionStartIncluding": "6.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.0.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "96BCEBCD-39E1-4889-BB2B-BF988A693F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.0.2:*:*:*:*:windows:*:*",
"matchCriteriaId": "7969D4A9-CA2A-4D10-9530-CFCC30FACAB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.0.3:*:*:*:*:windows:*:*",
"matchCriteriaId": "E1F57C30-B25E-4849-A2EB-5C3CBEECF67A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.0.4:*:*:*:*:windows:*:*",
"matchCriteriaId": "D4460267-4A26-4C0B-AF50-675153FC99A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.1.0:*:*:*:*:windows:*:*",
"matchCriteriaId": "67A07CC6-0AA4-429D-BF17-8F431254D9B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.1.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "D331BC30-504F-4431-B329-DBD9639EAE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.1.2:*:*:*:*:windows:*:*",
"matchCriteriaId": "61398D1E-FC1A-4D1B-B202-E0E4ABD565E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.1.3:*:*:*:*:windows:*:*",
"matchCriteriaId": "E60E37E5-D1B9-4F46-AFCC-2D8B124CA741",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.2.0:*:*:*:*:windows:*:*",
"matchCriteriaId": "365988CE-3AAC-43CA-98B5-9CDD20672AA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.2.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "914F0153-831A-44B3-9990-9066D46CED68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.2.2:*:*:*:*:windows:*:*",
"matchCriteriaId": "81CD48E3-DC5B-4572-A63F-6D7EE9B34DD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.2.3:*:*:*:*:windows:*:*",
"matchCriteriaId": "61576917-A85A-4509-9B7F-B9A7900C1A65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.2.4:*:*:*:*:windows:*:*",
"matchCriteriaId": "D2700E55-B7C9-4DA9-A6E8-1662A2E9130B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.2.5:*:*:*:*:windows:*:*",
"matchCriteriaId": "DACFE873-F65E-40B1-B95F-E27695D9D958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.2.6:*:*:*:*:windows:*:*",
"matchCriteriaId": "DEACFA3A-B144-45A4-9D59-1C0FB019D4A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.2.7:*:*:*:*:windows:*:*",
"matchCriteriaId": "58F85212-999B-484F-8D68-D423CC612CA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.3.0:*:*:*:*:windows:*:*",
"matchCriteriaId": "ECF43D36-58BC-40FB-9BEE-DE8F2111B183",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.3.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "D41B7F2F-E0EC-4B1B-BA18-ABC07A52C3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.3.2:*:*:*:*:windows:*:*",
"matchCriteriaId": "522F0516-82F3-42A2-9AC1-A95525F9E7A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.3.3:*:*:*:*:windows:*:*",
"matchCriteriaId": "6EC731B9-49B3-4844-80DB-FF4C95A7902F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.3.4:*:*:*:*:windows:*:*",
"matchCriteriaId": "86CF9C71-1A41-45E6-8277-B0AB3D9BB280",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:4.3.5:*:*:*:*:windows:*:*",
"matchCriteriaId": "27509B90-F015-4D23-A00C-6F5ABEF28E9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:5.2.0:*:*:*:*:windows:*:*",
"matchCriteriaId": "11A531A9-AE81-49BB-977D-C6355EDE4E29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:5.2.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "AEFFEFF8-9998-44D5-B154-F2233BF3246F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:5.2.2:*:*:*:*:windows:*:*",
"matchCriteriaId": "3B58C558-77BC-4A90-8892-A9EC7FF841CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:5.2.3:*:*:*:*:windows:*:*",
"matchCriteriaId": "12D8687C-5086-4A8B-AF5D-0A5A2818685E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:5.2.4:*:*:*:*:windows:*:*",
"matchCriteriaId": "E10669AD-BB00-4F79-9E47-3CD0C768BB26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:5.2.5:*:*:*:*:windows:*:*",
"matchCriteriaId": "8D52A748-EA79-46A7-9BA3-849222A89D70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:5.2.6:*:*:*:*:windows:*:*",
"matchCriteriaId": "267AD2B3-75DE-454F-9A9A-8C47610BAD83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:6.4.0:*:*:*:*:windows:*:*",
"matchCriteriaId": "F6540A80-C6CF-4DF7-A815-62BCACA093D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:6.4.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "3237811F-5AC5-49AB-A1F5-EEB04A7C049D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions."
},
{
"lang": "es",
"value": "Un control inapropiado de un recurso a lo largo de su vida en Fortinet FortiClientWindows versi\u00f3n 6.4.1 y 6.4.0, versi\u00f3n 6.2.9 y anteriores, versi\u00f3n 6.0.10 y anteriores, permite a un atacante causar una denegaci\u00f3n de servicio completa de sus componentes por medio de cambios en los permisos de acceso al directorio"
}
],
"id": "CVE-2021-43204",
"lastModified": "2024-11-21T06:28:50.483",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6,
"source": "psirt@fortinet.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-12-09T09:15:07.080",
"references": [
{
"source": "psirt@fortinet.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://fortiguard.com/advisory/FG-IR-21-167"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://fortiguard.com/advisory/FG-IR-21-167"
}
],
"sourceIdentifier": "psirt@fortinet.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…