First published: Wed Dec 08 2021(Updated: )
A use of hard-coded cryptographic key vulnerability in the SSLVPN of FortiOS before 7.0.1 may allow an attacker to retrieve the key by reverse engineering.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=5.6.0<=5.6.13 | |
Fortinet FortiOS IPS Engine | >=6.0.0<=6.0.12 | |
Fortinet FortiOS IPS Engine | >=6.2.0<=6.2.8 | |
Fortinet FortiOS IPS Engine | >=6.4.0<=6.4.5 | |
Fortinet FortiOS IPS Engine | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26108 is rated as a critical severity vulnerability due to the risk of the hard-coded cryptographic key being exploited.
To fix CVE-2021-26108, update FortiOS to version 7.0.1 or later, as it addresses this vulnerability.
FortiOS versions prior to 7.0.1, specifically 5.6.0 to 5.6.13, 6.0.0 to 6.0.12, 6.2.0 to 6.2.8, and 6.4.0 to 6.4.5 are affected by CVE-2021-26108.
The potential impact of CVE-2021-26108 includes unauthorized access to sensitive information due to the retrieval of the hard-coded cryptographic key.
Organizations using affected versions of FortiOS for SSLVPN services are impacted by CVE-2021-26108.