A use of a cryptographically weak pseudo-random number generator vulnerability in the authenticator of the Identity Based Encryption service of FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to infer parts of users authentication tokens and reset their credentials.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/advisory/FG-IR-21-031 |
![]() ![]() |
History
Mon, 31 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 24 Mar 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use of a cryptographically weak pseudo-random number generator vulnerability in the authenticator of the Identity Based Encryption service of FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to infer parts of users authentication tokens and reset their credentials. | |
First Time appeared |
Fortinet
Fortinet fortimail |
|
Weaknesses | CWE-338 | |
CPEs | cpe:2.3:a:fortinet:fortimail:6.2.*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.4.4:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortimail |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-03-31T18:11:58.179Z
Reserved: 2021-01-25T14:47:15.092Z
Link: CVE-2021-26091

Updated: 2025-03-31T18:11:52.931Z

Status : Awaiting Analysis
Published: 2025-03-24T16:15:16.450
Modified: 2025-03-27T16:44:44.143
Link: CVE-2021-26091

No data.