Multiple vulnerabilities in the authentication mechanism of confd in FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, 6.1.0 through 6.1.2, 6.0.0 thorugh 6.0.7, including an instance of concurrent execution using shared resource with improper synchronization and one of authentication bypass by capture-replay, may allow a remote unauthenticated attacker to circumvent the authentication process and authenticate as a legitimate cluster peer.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-21-130 | Patch Vendor Advisory |
https://fortiguard.com/advisory/FG-IR-21-130 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:25
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.3 |
References | () https://fortiguard.com/advisory/FG-IR-21-130 - Patch, Vendor Advisory |
Information
Published : 2021-12-08 19:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-41025
Mitre link : CVE-2021-41025
CVE.ORG link : CVE-2021-41025
JSON object : View
Products Affected
fortinet
- fortiweb
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')