CVE-2021-36173

A heap-based buffer overflow in the firmware signature verification function of FortiOS versions 7.0.1, 7.0.0, 6.4.0 through 6.4.6, 6.2.0 through 6.2.9, and 6.0.0 through 6.0.13 may allow an attacker to execute arbitrary code via specially crafted installation images.
References
Link Resource
https://fortiguard.com/advisory/FG-IR-21-115 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:*
OR cpe:2.3:h:fortinet:fortigate-1100e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-200f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-2600f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-3500f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-400e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate-600e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_1800f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_2200e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_3300e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_3600e:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_40f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_60f:-:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortigate_7121f:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-12-08 19:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-36173

Mitre link : CVE-2021-36173

CVE.ORG link : CVE-2021-36173


JSON object : View

Products Affected

fortinet

  • fortigate_2200e
  • fortigate_40f
  • fortigate-200f
  • fortigate-2600f
  • fortigate-3500f
  • fortigate_7121f
  • fortigate_3300e
  • fortigate_60f
  • fortigate_1800f
  • fortigate-1100e
  • fortigate-600e
  • fortigate_3600e
  • fortigate-400e
  • fortios
CWE
CWE-787

Out-of-bounds Write