First published: Wed Apr 06 2022(Updated: )
Multiple OS command injection (CWE-78) vulnerabilities in the command line interface of FortiManager 6.2.7 and below, 6.4.5 and below and all versions of 6.2.x, 6.0.x and 5.6.x, FortiAnalyzer 6.2.7 and below, 6.4.5 and below and all versions of 6.2.x, 6.0.x and 5.6.x, and FortiPortal 5.2.5 and below, 5.3.5 and below and 6.0.4 and below may allow a local authenticated and unprivileged user to execute arbitrary shell commands as root via specifically crafted CLI command parameters.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=5.6.0<6.0.11 | |
Fortinet FortiAnalyzer | >=6.2.0<6.2.8 | |
Fortinet FortiAnalyzer | >=6.4.0<6.4.6 | |
Fortinet FortiManager | >=5.6.0<6.0.11 | |
Fortinet FortiManager | >=6.2.0<6.2.8 | |
Fortinet FortiManager | >=6.4.0<6.4.6 | |
Fortinet FortiPortal | <5.2.6 | |
Fortinet FortiPortal | >=5.3.0<5.3.6 | |
Fortinet FortiPortal | >=6.0.0<6.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26104 is a multiple OS command injection (CWE-78) vulnerabilities in the command line interface of FortiManager, FortiAnalyzer, and FortiPortal.
CVE-2021-26104 has a severity rating of 7.8 (high).
FortiManager versions 6.2.7 and below, 6.4.5 and below, and all versions of 6.2.x, 6.0.x, and 5.6.x. FortiAnalyzer versions 6.2.7 and below, 6.4.5 and below, and all versions of 6.2.x, 6.0.x, and 5.6.x. FortiPortal versions 5.2.5 and below.
To fix the CVE-2021-26104 vulnerability, upgrade FortiManager to version 6.2.8 or higher, 6.4.6 or higher, or use the provided workaround. Upgrade FortiAnalyzer to version 6.2.8 or higher, 6.4.6 or higher, or use the provided workaround. Upgrade FortiPortal to version 5.2.6 or higher, 5.3.6 or higher, 6.0.5 or higher, or use the provided workaround.
You can find more information about CVE-2021-26104 on the FortiGuard advisory page and the GitHub security advisory page.