A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-21-067 |
![]() ![]() |
History
Fri, 31 Jan 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet fortiportal
|
|
CPEs | cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet fortiportal
|
Fri, 20 Dec 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Dec 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use after free in Fortinet FortiManager, FortiAnalyzer allows attacker to execute unauthorized code or commands via <insert attack vector here> | A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device. |
Thu, 19 Dec 2024 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use after free in Fortinet FortiManager, FortiAnalyzer allows attacker to execute unauthorized code or commands via <insert attack vector here> | |
First Time appeared |
Fortinet
Fortinet fortianalyzer Fortinet fortimanager |
|
Weaknesses | CWE-416 | |
CPEs | cpe:2.3:o:fortinet:fortianalyzer:5.2.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.2.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.3.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.4.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.12:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.0.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.2.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.4.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortianalyzer Fortinet fortimanager |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-12-20T21:55:26.925Z
Reserved: 2021-05-11T21:19:05.181Z
Link: CVE-2021-32589

Updated: 2024-12-20T21:54:52.493Z

Status : Analyzed
Published: 2024-12-19T13:15:05.707
Modified: 2025-01-31T17:42:05.437
Link: CVE-2021-32589

No data.