All the vulnerabilites related to Fortinet - FortiIsolator
var-202205-0180
Vulnerability from variot
An improper access control vulnerability [CWE-284] in FortiIsolator versions 2.3.2 and below may allow an authenticated, non privileged attacker to regenerate the CA certificate via the regeneration URL. FortiIsolator Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0180", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fortiisolator", "scope": "lt", "trust": 1.0, "vendor": "fortinet", "version": "2.3.3" }, { "model": "fortiisolator", "scope": "gte", "trust": 1.0, "vendor": "fortinet", "version": "2.3.0" }, { "model": "fortiisolator", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": null }, { "model": "fortiisolator", "scope": "lte", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "2.3.2 and earlier" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010452" }, { "db": "NVD", "id": "CVE-2021-41020" } ] }, "cve": "CVE-2021-41020", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2021-41020", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-402292", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-41020", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-010452", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-41020", "trust": 1.0, "value": "HIGH" }, { "author": "psirt@fortinet.com", "id": "CVE-2021-41020", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-41020", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202205-2039", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-402292", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-41020", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-402292" }, { "db": "VULMON", "id": "CVE-2021-41020" }, { "db": "JVNDB", "id": "JVNDB-2022-010452" }, { "db": "CNNVD", "id": "CNNVD-202205-2039" }, { "db": "NVD", "id": "CVE-2021-41020" }, { "db": "NVD", "id": "CVE-2021-41020" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An improper access control vulnerability [CWE-284] in FortiIsolator versions 2.3.2 and below may allow an authenticated, non privileged attacker to regenerate the CA certificate via the regeneration URL. FortiIsolator Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-41020" }, { "db": "JVNDB", "id": "JVNDB-2022-010452" }, { "db": "VULHUB", "id": "VHN-402292" }, { "db": "VULMON", "id": "CVE-2021-41020" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-41020", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-010452", "trust": 0.8 }, { "db": "CS-HELP", "id": "SB2022050322", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-2039", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-402292", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-41020", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-402292" }, { "db": "VULMON", "id": "CVE-2021-41020" }, { "db": "JVNDB", "id": "JVNDB-2022-010452" }, { "db": "CNNVD", "id": "CNNVD-202205-2039" }, { "db": "NVD", "id": "CVE-2021-41020" } ] }, "id": "VAR-202205-0180", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-402292" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:42:47.813000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "FG-IR-21-040", "trust": 0.8, "url": "https://www.fortiguard.com/psirt/FG-IR-21-040" }, { "title": "Fortinet FortiIsolator Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=199821" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010452" }, { "db": "CNNVD", "id": "CNNVD-202205-2039" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-402292" }, { "db": "JVNDB", "id": "JVNDB-2022-010452" }, { "db": "NVD", "id": "CVE-2021-41020" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://fortiguard.com/psirt/fg-ir-21-040" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41020" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-41020/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022050322" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/863.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-402292" }, { "db": "VULMON", "id": "CVE-2021-41020" }, { "db": "JVNDB", "id": "JVNDB-2022-010452" }, { "db": "CNNVD", "id": "CNNVD-202205-2039" }, { "db": "NVD", "id": "CVE-2021-41020" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-402292" }, { "db": "VULMON", "id": "CVE-2021-41020" }, { "db": "JVNDB", "id": "JVNDB-2022-010452" }, { "db": "CNNVD", "id": "CNNVD-202205-2039" }, { "db": "NVD", "id": "CVE-2021-41020" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-04T00:00:00", "db": "VULHUB", "id": "VHN-402292" }, { "date": "2022-05-04T00:00:00", "db": "VULMON", "id": "CVE-2021-41020" }, { "date": "2023-08-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-010452" }, { "date": "2022-05-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2039" }, { "date": "2022-05-04T16:15:08.100000", "db": "NVD", "id": "CVE-2021-41020" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-402292" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-41020" }, { "date": "2023-08-15T07:03:00", "db": "JVNDB", "id": "JVNDB-2022-010452" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2039" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-41020" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2039" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FortiIsolator\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010452" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2039" } ], "trust": 0.6 } }
var-202003-1589
Vulnerability from variot
An improper neutralization of input vulnerability in the URL Description in Fortinet FortiIsolator version 1.2.2 allows a remote authenticated attacker to perform a cross site scripting attack (XSS). Fortinet FortiIsolator Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with. A cross-site scripting vulnerability exists in the URL description of the URL filter in Fortinet FortiIsolator 1.2.2 and earlier versions. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1589", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fortiisolator", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "1.2.2" }, { "model": "fortiisolator", "scope": "eq", "trust": 0.8, "vendor": "fortinet", "version": "1.2.2" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002896" }, { "db": "NVD", "id": "CVE-2020-6643" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:fortinet:fortiisolator", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002896" } ] }, "cve": "CVE-2020-6643", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "exploitabilityScore": 6.8, "id": "CVE-2020-6643", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.5, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-002896", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "exploitabilityScore": 6.8, "id": "VHN-184768", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:S/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.3, "id": "CVE-2020-6643", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.4, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2020-002896", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6643", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-002896", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202003-781", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-184768", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-6643", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-184768" }, { "db": "VULMON", "id": "CVE-2020-6643" }, { "db": "JVNDB", "id": "JVNDB-2020-002896" }, { "db": "CNNVD", "id": "CNNVD-202003-781" }, { "db": "NVD", "id": "CVE-2020-6643" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An improper neutralization of input vulnerability in the URL Description in Fortinet FortiIsolator version 1.2.2 allows a remote authenticated attacker to perform a cross site scripting attack (XSS). Fortinet FortiIsolator Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with. A cross-site scripting vulnerability exists in the URL description of the URL filter in Fortinet FortiIsolator 1.2.2 and earlier versions. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code", "sources": [ { "db": "NVD", "id": "CVE-2020-6643" }, { "db": "JVNDB", "id": "JVNDB-2020-002896" }, { "db": "VULHUB", "id": "VHN-184768" }, { "db": "VULMON", "id": "CVE-2020-6643" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6643", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2020-002896", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202003-781", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.0907", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-184768", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-6643", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-184768" }, { "db": "VULMON", "id": "CVE-2020-6643" }, { "db": "JVNDB", "id": "JVNDB-2020-002896" }, { "db": "CNNVD", "id": "CNNVD-202003-781" }, { "db": "NVD", "id": "CVE-2020-6643" } ] }, "id": "VAR-202003-1589", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-184768" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:03:55.284000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "FG-IR-19-270", "trust": 0.8, "url": "https://fortiguard.com/psirt/FG-IR-19-270" }, { "title": "Fortinet FortiIsolator Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=112508" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002896" }, { "db": "CNNVD", "id": "CNNVD-202003-781" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-184768" }, { "db": "JVNDB", "id": "JVNDB-2020-002896" }, { "db": "NVD", "id": "CVE-2020-6643" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://fortiguard.com/advisory/fg-ir-19-270" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6643" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6643" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0907/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/79.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-184768" }, { "db": "VULMON", "id": "CVE-2020-6643" }, { "db": "JVNDB", "id": "JVNDB-2020-002896" }, { "db": "CNNVD", "id": "CNNVD-202003-781" }, { "db": "NVD", "id": "CVE-2020-6643" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-184768" }, { "db": "VULMON", "id": "CVE-2020-6643" }, { "db": "JVNDB", "id": "JVNDB-2020-002896" }, { "db": "CNNVD", "id": "CNNVD-202003-781" }, { "db": "NVD", "id": "CVE-2020-6643" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-12T00:00:00", "db": "VULHUB", "id": "VHN-184768" }, { "date": "2020-03-12T00:00:00", "db": "VULMON", "id": "CVE-2020-6643" }, { "date": "2020-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002896" }, { "date": "2020-03-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-781" }, { "date": "2020-03-12T22:15:15.780000", "db": "NVD", "id": "CVE-2020-6643" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-17T00:00:00", "db": "VULHUB", "id": "VHN-184768" }, { "date": "2020-03-17T00:00:00", "db": "VULMON", "id": "CVE-2020-6643" }, { "date": "2020-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002896" }, { "date": "2021-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-781" }, { "date": "2020-03-17T18:00:40.997000", "db": "NVD", "id": "CVE-2020-6643" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-781" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fortinet FortiIsolator Cross-site scripting vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002896" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-781" } ], "trust": 0.6 } }
var-202102-0771
Vulnerability from variot
An insufficient session expiration vulnerability in FortiNet's FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks). FortiNet FortiIsolator Is vulnerable to a session expiration.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Fortinet FortiIsolator is an application provided by Fortinet Corporation of the United States to provide remote security isolation functions for browsers. The application adds additional advanced threat protection to the Fortinet Security Fabric and protects critical business data from sophisticated threats on the network. Content and files from the web are accessed in remote containers, which then present risk-free content to users
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0771", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fortiisolator", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "2.0.1" }, { "model": "fortiisolator", "scope": "lte", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": "2.0.1 and earlier" }, { "model": "fortiisolator", "scope": "eq", "trust": 0.8, "vendor": "\u30d5\u30a9\u30fc\u30c6\u30a3\u30cd\u30c3\u30c8", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015916" }, { "db": "NVD", "id": "CVE-2020-6649" } ] }, "cve": "CVE-2020-6649", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-6649", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-184774", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-6649", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-6649", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6649", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2020-6649", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202102-564", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-184774", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-184774" }, { "db": "JVNDB", "id": "JVNDB-2020-015916" }, { "db": "CNNVD", "id": "CNNVD-202102-564" }, { "db": "NVD", "id": "CVE-2020-6649" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An insufficient session expiration vulnerability in FortiNet\u0027s FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks). FortiNet FortiIsolator Is vulnerable to a session expiration.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Fortinet FortiIsolator is an application provided by Fortinet Corporation of the United States to provide remote security isolation functions for browsers. The application adds additional advanced threat protection to the Fortinet Security Fabric and protects critical business data from sophisticated threats on the network. Content and files from the web are accessed in remote containers, which then present risk-free content to users", "sources": [ { "db": "NVD", "id": "CVE-2020-6649" }, { "db": "JVNDB", "id": "JVNDB-2020-015916" }, { "db": "VULHUB", "id": "VHN-184774" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6649", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015916", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202102-564", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0413", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-184774", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-184774" }, { "db": "JVNDB", "id": "JVNDB-2020-015916" }, { "db": "CNNVD", "id": "CNNVD-202102-564" }, { "db": "NVD", "id": "CVE-2020-6649" } ] }, "id": "VAR-202102-0771", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-184774" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:18:35.451000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "FG-IR-20-011", "trust": 0.8, "url": "https://www.fortiguard.com/psirt/FG-IR-20-011" }, { "title": "Fortinet FortiIsolator Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=141730" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015916" }, { "db": "CNNVD", "id": "CNNVD-202102-564" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-613", "trust": 1.1 }, { "problemtype": "Inappropriate session deadline (CWE-613) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-184774" }, { "db": "JVNDB", "id": "JVNDB-2020-015916" }, { "db": "NVD", "id": "CVE-2020-6649" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://fortiguard.com/advisory/fg-ir-20-011" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6649" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0413" } ], "sources": [ { "db": "VULHUB", "id": "VHN-184774" }, { "db": "JVNDB", "id": "JVNDB-2020-015916" }, { "db": "CNNVD", "id": "CNNVD-202102-564" }, { "db": "NVD", "id": "CVE-2020-6649" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-184774" }, { "db": "JVNDB", "id": "JVNDB-2020-015916" }, { "db": "CNNVD", "id": "CNNVD-202102-564" }, { "db": "NVD", "id": "CVE-2020-6649" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-08T00:00:00", "db": "VULHUB", "id": "VHN-184774" }, { "date": "2021-10-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015916" }, { "date": "2021-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-564" }, { "date": "2021-02-08T16:15:11.907000", "db": "NVD", "id": "CVE-2020-6649" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-10T00:00:00", "db": "VULHUB", "id": "VHN-184774" }, { "date": "2021-10-22T08:29:00", "db": "JVNDB", "id": "JVNDB-2020-015916" }, { "date": "2021-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-564" }, { "date": "2021-02-10T19:02:34.440000", "db": "NVD", "id": "CVE-2020-6649" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-564" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FortiNet\u00a0FortiIsolator\u00a0 Session deadline vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015916" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-564" } ], "trust": 0.6 } }
cve-2020-6649
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://fortiguard.com/advisory/FG-IR-20-011 | x_refsource_CONFIRM |
▼ | Vendor | Product |
---|---|---|
Fortinet | Fortinet FortiIsolator |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:11:04.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://fortiguard.com/advisory/FG-IR-20-011" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-6649", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-24T20:10:53.026105Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T14:23:02.065Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Fortinet FortiIsolator", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "FortiIsolator 2.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "An insufficient session expiration vulnerability in FortiNet\u0027s FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)" } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-08T15:53:06", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://fortiguard.com/advisory/FG-IR-20-011" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@fortinet.com", "ID": "CVE-2020-6649", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fortinet FortiIsolator", "version": { "version_data": [ { "version_value": "FortiIsolator 2.0.1" } ] } } ] }, "vendor_name": "Fortinet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An insufficient session expiration vulnerability in FortiNet\u0027s FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/advisory/FG-IR-20-011", "refsource": "CONFIRM", "url": "https://fortiguard.com/advisory/FG-IR-20-011" } ] } } } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2020-6649", "datePublished": "2021-02-08T15:53:06", "dateReserved": "2020-01-09T00:00:00", "dateUpdated": "2024-10-25T14:23:02.065Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41020
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://fortiguard.com/psirt/FG-IR-21-040 | x_refsource_CONFIRM |
▼ | Vendor | Product |
---|---|---|
Fortinet | Fortinet FortiIsolator |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:30.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-21-040" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-41020", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T14:12:38.651678Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T13:32:21.471Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Fortinet FortiIsolator", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "FortiIsolator 2.3.2, 2.3.1, 2.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability [CWE-284] in FortiIsolator versions 2.3.2 and below may allow an authenticated, non privileged attacker to regenerate the CA certificate via the regeneration URL." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitCodeMaturity": "FUNCTIONAL", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "remediationLevel": "NOT_DEFINED", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 8.6, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Improper access control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-04T15:25:10", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://fortiguard.com/psirt/FG-IR-21-040" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@fortinet.com", "ID": "CVE-2021-41020", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fortinet FortiIsolator", "version": { "version_data": [ { "version_value": "FortiIsolator 2.3.2, 2.3.1, 2.3.0" } ] } } ] }, "vendor_name": "Fortinet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability [CWE-284] in FortiIsolator versions 2.3.2 and below may allow an authenticated, non privileged attacker to regenerate the CA certificate via the regeneration URL." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Network", "availabilityImpact": "High", "baseScore": 8.6, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "userInteraction": "None", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper access control" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/psirt/FG-IR-21-040", "refsource": "CONFIRM", "url": "https://fortiguard.com/psirt/FG-IR-21-040" } ] } } } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2021-41020", "datePublished": "2022-05-04T15:25:10", "dateReserved": "2021-09-13T00:00:00", "dateUpdated": "2024-10-25T13:32:21.471Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32124
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
Fortinet | FortiIsolator |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32124", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-18T13:45:16.553405Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-18T13:45:22.747Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:fortinet:fortiisolator:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "FortiIsolator", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "2.4.4", "status": "affected", "version": "2.4.3", "versionType": "semver" }, { "lessThanOrEqual": "2.3.4", "status": "affected", "version": "2.3.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability [CWE-284] in FortiIsolator version 2.4.4, version 2.4.3, 2.3 all versions logging component may allow a remote authenticated read-only attacker to alter logs via a crafted HTTP request." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:X/RC:X", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper access control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-18T08:08:21.544Z", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "name": "https://fortiguard.fortinet.com/psirt/FG-IR-24-045", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-045" } ], "solutions": [ { "lang": "en", "value": "Please upgrade to FortiIsolator version 2.4.5 or above" } ] } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2024-32124", "datePublished": "2025-07-18T08:08:21.544Z", "dateReserved": "2024-04-11T12:09:46.571Z", "dateUpdated": "2025-07-18T13:45:22.747Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-55590
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
Fortinet | FortiIsolator |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-55590", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-11T16:03:27.550889Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:05:38.384Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [], "defaultStatus": "unaffected", "product": "FortiIsolator", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "2.4.5", "status": "affected", "version": "2.4.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple improper neutralization of special elements used in an OS command (\u0027OS Command Injection\u0027) vulnerabilities [CWE-78] in Fortinet FortiIsolator version 2.4.0 through 2.4.5 allows an authenticated attacker with at least read-only admin permission and CLI access to execute unauthorized code via specifically crafted CLI commands." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Execute unauthorized code or commands", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-11T14:54:34.932Z", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "name": "https://fortiguard.fortinet.com/psirt/FG-IR-24-178", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-178" } ], "solutions": [ { "lang": "en", "value": "Please upgrade to FortiIsolator version 2.4.6 or above" } ] } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2024-55590", "datePublished": "2025-03-11T14:54:34.932Z", "dateReserved": "2024-12-09T11:19:49.470Z", "dateUpdated": "2025-03-11T16:05:38.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27779
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
Fortinet | FortiSandbox | |
Fortinet | FortiIsolator |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-27779", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-18T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-19T03:55:13.564Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:fortinet:fortisandbox:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:3.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "FortiSandbox", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "4.4.4", "status": "affected", "version": "4.4.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2.0", "versionType": "semver" }, { "lessThanOrEqual": "4.0.6", "status": "affected", "version": "4.0.0", "versionType": "semver" }, { "lessThanOrEqual": "3.2.4", "status": "affected", "version": "3.2.0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:fortinet:fortiisolator:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:1.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "FortiIsolator", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "2.4.4", "status": "affected", "version": "2.4.0", "versionType": "semver" }, { "lessThanOrEqual": "2.3.4", "status": "affected", "version": "2.3.0", "versionType": "semver" }, { "status": "affected", "version": "2.2.0" }, { "lessThanOrEqual": "2.1.2", "status": "affected", "version": "2.1.0", "versionType": "semver" }, { "lessThanOrEqual": "2.0.1", "status": "affected", "version": "2.0.0", "versionType": "semver" }, { "lessThanOrEqual": "1.2.2", "status": "affected", "version": "1.2.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 4.4.4 and below, version 4.2.6 and below, 4.0 all versions, 3.2 all versions and FortiIsolator version 2.4 and below, 2.3 all versions, 2.2 all versions, 2.1 all versions, 2.0 all versions, 1.2 all versions may allow a remote attacker in possession of an admin session cookie to keep using that admin\u0027s session even after the admin user was deleted." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L/E:P/RL:X/RC:C", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "Improper access control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-18T07:58:23.943Z", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "name": "https://fortiguard.fortinet.com/psirt/FG-IR-24-035", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-035" } ], "solutions": [ { "lang": "en", "value": "Please upgrade to FortiSandbox version 4.4.5 or above \nPlease upgrade to FortiSandbox version 4.2.7 or above \nPlease upgrade to FortiIsolator version 2.4.5 or above" } ] } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2024-27779", "datePublished": "2025-07-18T07:58:23.943Z", "dateReserved": "2024-02-26T14:46:31.334Z", "dateUpdated": "2025-07-19T03:55:13.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22298
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
Fortinet | FortiIsolator |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.440Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://fortiguard.com/psirt/FG-IR-21-233", "tags": [ "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-21-233" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:fortinet:fortiisolator:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fortiisolator", "vendor": "fortinet", "versions": [ { "status": "affected", "version": "1.0.0" }, { "status": "affected", "version": "1.1.0" }, { "status": "affected", "version": "1.2.0" }, { "status": "affected", "version": "1.2.1" }, { "status": "affected", "version": "1.2.2" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.2.0" } ] }, { "cpes": [ "cpe:2.3:a:fortinet:fortiisolator:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiisolator:2.3.3:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fortiisolator", "vendor": "fortinet", "versions": [ { "lessThanOrEqual": "2.3.3", "status": "affected", "version": "2.3.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-22298", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T19:43:19.024763Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T19:48:48.594Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FortiIsolator", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "2.3.3", "status": "affected", "version": "2.3.0", "versionType": "semver" }, { "status": "affected", "version": "2.2.0" }, { "lessThanOrEqual": "2.1.2", "status": "affected", "version": "2.1.0", "versionType": "semver" }, { "lessThanOrEqual": "2.0.1", "status": "affected", "version": "2.0.0", "versionType": "semver" }, { "lessThanOrEqual": "1.2.2", "status": "affected", "version": "1.2.0", "versionType": "semver" }, { "status": "affected", "version": "1.1.0" }, { "status": "affected", "version": "1.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A improper neutralization of special elements used in an os command (\u0027os command injection\u0027) in Fortinet FortiIsolator version 1.0.0, FortiIsolator version 1.1.0, FortiIsolator version 1.2.0 through 1.2.2, FortiIsolator version 2.0.0 through 2.0.1, FortiIsolator version 2.1.0 through 2.1.2, FortiIsolator version 2.2.0, FortiIsolator version 2.3.0 through 2.3.4 allows attacker to execute arbitrary OS commands in the underlying shell via specially crafted input parameters." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:H/RL:X/RC:C", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Execute unauthorized code or commands", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-10T16:49:46.033Z", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "name": "https://fortiguard.com/psirt/FG-IR-21-233", "url": "https://fortiguard.com/psirt/FG-IR-21-233" } ], "solutions": [ { "lang": "en", "value": "Upgrade to FortiIsolator version\u00a02.4.0 or above." } ] } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2022-22298", "datePublished": "2023-10-10T16:49:46.033Z", "dateReserved": "2022-01-03T09:39:36.528Z", "dateUpdated": "2024-09-18T19:48:48.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54024
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
Fortinet | FortiIsolator |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54024", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-08T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T04:00:38.683Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [], "defaultStatus": "unaffected", "product": "FortiIsolator", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "2.4.6", "status": "affected", "version": "2.4.3", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an OS command (\u0027OS Command Injection\u0027) vulnerability [CWE-78] in Fortinet FortiIsolator before version 2.4.6 allows a privileged attacker with super-admin profile and CLI access to execute unauthorized code via specifically crafted HTTP requests." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Escalation of privilege", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-08T14:02:45.963Z", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "name": "https://fortiguard.fortinet.com/psirt/FG-IR-24-397", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-397" } ], "solutions": [ { "lang": "en", "value": "Please upgrade to FortiIsolator version 2.4.7 or above" } ] } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2024-54024", "datePublished": "2025-04-08T14:02:45.963Z", "dateReserved": "2024-11-27T15:20:39.890Z", "dateUpdated": "2025-04-09T04:00:38.683Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-6643
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://fortiguard.com/advisory/FG-IR-19-270 | x_refsource_CONFIRM |
▼ | Vendor | Product |
---|---|---|
Fortinet | Fortinet FortiIsolator |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:11:04.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://fortiguard.com/advisory/FG-IR-19-270" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-6643", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T13:59:27.992178Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T14:03:06.410Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Fortinet FortiIsolator", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "1.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper neutralization of input vulnerability in the URL Description in Fortinet FortiIsolator version 1.2.2 allows a remote authenticated attacker to perform a cross site scripting attack (XSS)." } ], "problemTypes": [ { "descriptions": [ { "description": "Execute unauthorized code or commands", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-12T21:20:50", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://fortiguard.com/advisory/FG-IR-19-270" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@fortinet.com", "ID": "CVE-2020-6643", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fortinet FortiIsolator", "version": { "version_data": [ { "version_value": "1.2.2" } ] } } ] }, "vendor_name": "Fortinet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper neutralization of input vulnerability in the URL Description in Fortinet FortiIsolator version 1.2.2 allows a remote authenticated attacker to perform a cross site scripting attack (XSS)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Execute unauthorized code or commands" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/advisory/FG-IR-19-270", "refsource": "CONFIRM", "url": "https://fortiguard.com/advisory/FG-IR-19-270" } ] } } } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2020-6643", "datePublished": "2020-03-12T21:20:50", "dateReserved": "2020-01-09T00:00:00", "dateUpdated": "2024-10-25T14:03:06.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54025
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
Fortinet | FortiIsolator |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54025", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-08T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T04:00:36.950Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [], "defaultStatus": "unaffected", "product": "FortiIsolator", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "2.4.6", "status": "affected", "version": "2.4.3", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an OS command (\u0027OS Command Injection\u0027) vulnerability [CWE-78] in Fortinet FortiIsolator CLI before version 2.4.6 allows a privileged attacker to execute unauthorized code or commands via crafted CLI requests." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Escalation of privilege", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-08T14:02:45.565Z", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "name": "https://fortiguard.fortinet.com/psirt/FG-IR-24-392", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-392" } ], "solutions": [ { "lang": "en", "value": "Please upgrade to FortiIsolator version 2.4.7 or above" } ] } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2024-54025", "datePublished": "2025-04-08T14:02:45.565Z", "dateReserved": "2024-11-27T15:20:39.891Z", "dateUpdated": "2025-04-09T04:00:36.950Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }