Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-32591 |
CWE-ID | CWE-325 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
FortiSandbox Server applications / DLP, anti-spam, sniffers Fortinet FortiWeb Server applications / Remote management servers, RDP, SSH FortiADC Server applications / Other server solutions |
Vendor | Fortinet, Inc |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU58633
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32591
CWE-ID:
CWE-325 - Missing Required Cryptographic Step
Exploit availability: No
DescriptionThe vulnerability allows an attacker to compromise users' passwords.
The vulnerability exists due to missing cryptographic steps in the function that encrypts users' LDAP and RADIUS credentials. An attacker in possession of the password store to compromise the confidentiality of the encrypted secrets.
Install updates from vendor's website.
Vulnerable software versionsFortiSandbox: 3.2.0 - 4.0.0
Fortinet FortiWeb: 5.7.0 - 6.3.11
FortiADC: 5.0.0 - 6.2.0
External linkshttp://www.fortiguard.com/psirt/FG-IR-20-222
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.