First published: Wed Dec 08 2021(Updated: )
An integer overflow or wraparound vulnerability in the memory allocator of SSLVPN in FortiOS before 7.0.1 may allow an unauthenticated attacker to corrupt control data on the heap via specifically crafted requests to SSLVPN, resulting in potentially arbitrary code execution.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | >=6.0.0<=6.0.12 | |
FortiOS | >=6.2.0<=6.2.9 | |
FortiOS | >=6.4.0<=6.4.5 | |
FortiOS | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26109 has a critical severity rating due to its potential for arbitrary code execution.
To mitigate CVE-2021-26109, upgrade your FortiOS to version 7.0.1 or later.
CVE-2021-26109 affects multiple versions of FortiOS prior to 7.0.1, specifically versions from 6.0.0 to 6.0.12, 6.2.0 to 6.2.9, and 6.4.0 to 6.4.5.
CVE-2021-26109 is classified as an integer overflow or wraparound vulnerability.
Yes, CVE-2021-26109 can be exploited by unauthenticated attackers through specially crafted requests to SSLVPN.