First published: Mon Mar 24 2025(Updated: )
A use of a cryptographically weak pseudo-random number generator vulnerability in the authenticator of the Identity Based Encryption service of FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to infer parts of users authentication tokens and reset their credentials.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortimail-200d | >=6.4.0<=6.4.4>=6.2.0<=6.2.7 |
Please upgrade to FortiMail version 7.0.0 or above Please upgrade to FortiMail version 6.4.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26091 has been classified as a high severity vulnerability due to its potential to allow unauthenticated attackers to compromise user authentication.
To fix CVE-2021-26091, update FortiMail to version 6.4.5 or later, or 6.2.8 or later to mitigate the vulnerability.
CVE-2021-26091 affects users of FortiMail versions 6.4.0 to 6.4.4 and 6.2.0 to 6.2.7.
The potential impacts of CVE-2021-26091 include the ability for attackers to infer authentication tokens, leading to unauthorized access.
There is no official workaround for CVE-2021-26091; users are advised to upgrade to the patched versions.