First published: Tue Aug 03 2021(Updated: )
An uncontrolled resource consumption (denial of service) vulnerability in FortiSandbox and FortiAuthenticator login modules may allow an unauthenticated attacker to bring the device into an unresponsive state via specifically-crafted long request parameters.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAuthenticator | >=4.0.0<=4.3.4 | |
Fortinet FortiAuthenticator | >=5.0.0<=5.5.0 | |
Fortinet FortiAuthenticator | >=6.0.0<6.0.6 | |
Fortinet FortiSandbox | >=3.0.0<3.0.7 | |
Fortinet FortiSandbox | >=3.1.0<3.1.5 | |
Fortinet FortiSandbox | >=3.2.0<3.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this FortiSandbox and FortiAuthenticator vulnerability is CVE-2021-22124.
The severity of CVE-2021-22124 is high with a severity value of 7.5.
FortiSandbox versions 3.2.0 through 3.2.2, 3.1.0 through 3.1.4, and 3.0.0 through 3.0.6, as well as FortiAuthenticator versions before 6.0.6 are affected by CVE-2021-22124.
CVE-2021-22124 can allow an unauthenticated attacker to bring the device into an unresponsive state through an uncontrolled resource consumption (denial of service) vulnerability in the login modules.
Yes, you can find more information about CVE-2021-22124 at the following reference: https://fortiguard.com/advisory/FG-IR-20-170