CVE-2021-41027

A stack-based buffer overflow in Fortinet FortiWeb version 6.4.1 and 6.4.0, allows an authenticated attacker to execute unauthorized code or commands via crafted certificates loaded into the device.
References
Link Resource
https://fortiguard.com/advisory/FG-IR-21-134 Patch Vendor Advisory
https://fortiguard.com/advisory/FG-IR-21-134 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 06:25

Type Values Removed Values Added
CVSS v2 : 4.6
v3 : 7.8
v2 : 4.6
v3 : 7.3
References () https://fortiguard.com/advisory/FG-IR-21-134 - Patch, Vendor Advisory () https://fortiguard.com/advisory/FG-IR-21-134 - Patch, Vendor Advisory

Information

Published : 2021-12-08 13:15

Updated : 2024-11-21 06:25


NVD link : CVE-2021-41027

Mitre link : CVE-2021-41027

CVE.ORG link : CVE-2021-41027


JSON object : View

Products Affected

fortinet

  • fortiweb
CWE
CWE-787

Out-of-bounds Write