CVE-2021-43074
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An improper verification of cryptographic signature vulnerability [CWE-347] in FortiWeb 6.4 all versions, 6.3.16 and below, 6.2 all versions, 6.1 all versions, 6.0 all versions; FortiOS 7.0.3 and below, 6.4.8 and below, 6.2 all versions, 6.0 all versions; FortiSwitch 7.0.3 and below, 6.4.10 and below, 6.2 all versions, 6.0 all versions; FortiProxy 7.0.1 and below, 2.0.7 and below, 1.2 all versions, 1.1 all versions, 1.0 all versions may allow an attacker to decrypt portions of the administrative session management cookie if able to intercept the latter.
An improper verification of cryptographic signature vulnerability [CWE-347] in FortiWeb 6.4 all versions, 6.3.16 and below, 6.2 all versions, 6.1 all versions, 6.0 all versions; FortiOS 7.0.3 and below, 6.4.8 and below, 6.2 all versions, 6.0 all versions; FortiSwitch 7.0.3 and below, 6.4.10 and below, 6.2 all versions, 6.0 all versions; FortiProxy 7.0.1 and below, 2.0.7 and below, 1.2 all versions, 1.1 all versions, 1.0 all versions may allow an attacker to decrypt portions of the administrative session management cookie if able to intercept the latter.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2021-10-28 CVE Reserved
- 2023-02-16 CVE Published
- 2024-10-22 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-347: Improper Verification of Cryptographic Signature
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://fortiguard.com/psirt/FG-IR-21-126 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fortinet Search vendor "Fortinet" | Fortiproxy Search vendor "Fortinet" for product "Fortiproxy" | >= 1.0.0 < 2.0.8 Search vendor "Fortinet" for product "Fortiproxy" and version " >= 1.0.0 < 2.0.8" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiproxy Search vendor "Fortinet" for product "Fortiproxy" | >= 7.0.0 < 7.0.2 Search vendor "Fortinet" for product "Fortiproxy" and version " >= 7.0.0 < 7.0.2" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiweb Search vendor "Fortinet" for product "Fortiweb" | >= 6.0.0 < 6.3.17 Search vendor "Fortinet" for product "Fortiweb" and version " >= 6.0.0 < 6.3.17" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiweb Search vendor "Fortinet" for product "Fortiweb" | >= 6.4.0 < 7.0.0 Search vendor "Fortinet" for product "Fortiweb" and version " >= 6.4.0 < 7.0.0" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | >= 6.0.0 < 6.4.9 Search vendor "Fortinet" for product "Fortios" and version " >= 6.0.0 < 6.4.9" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | >= 7.0.0 < 7.0.4 Search vendor "Fortinet" for product "Fortios" and version " >= 7.0.0 < 7.0.4" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiswitch Search vendor "Fortinet" for product "Fortiswitch" | >= 6.0.0 < 6.4.11 Search vendor "Fortinet" for product "Fortiswitch" and version " >= 6.0.0 < 6.4.11" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiswitch Search vendor "Fortinet" for product "Fortiswitch" | >= 7.0.0 < 7.0.4 Search vendor "Fortinet" for product "Fortiswitch" and version " >= 7.0.0 < 7.0.4" | - |
Affected
|