First published: Thu Dec 19 2024(Updated: )
A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | <6.4.6<6.2.8<6.0.11<5.6.11<5.4.8<5.2.11<5.0.13 | |
Fortinet FortiAnalyzer | <6.4.6<6.2.8<6.0.11<5.6.11<5.4.8>=5.2.10<5.2.4 | |
Fortinet FortiAnalyzer | >=5.2.4<5.6.11 | |
Fortinet FortiAnalyzer | >=6.0.0<6.0.11 | |
Fortinet FortiAnalyzer | >=6.2.0<6.2.8 | |
Fortinet FortiAnalyzer | >=6.4.0<6.4.6 | |
Fortinet FortiAnalyzer | =7.0.0 | |
Fortinet FortiManager | >=5.0.0<5.6.11 | |
Fortinet FortiManager | >=6.0.0<6.0.11 | |
Fortinet FortiManager | >=6.2.0<6.2.8 | |
Fortinet FortiManager | >=6.4.0<6.4.6 | |
Fortinet FortiManager | =7.0.0 | |
Fortinet FortiPortal | >=4.0.0<5.3.7 | |
Fortinet FortiPortal | >=6.0.0<6.0.6 |
Please upgrade to FortiPortal version 6.0.6 or above Please upgrade to FortiPortal version 5.3.7 or above Please upgrade to FortiManager version 7.0.1 or above Please upgrade to FortiManager version 6.4.6 or above Please upgrade to FortiManager version 6.2.8 or above Please upgrade to FortiManager version 6.0.11 or above Please upgrade to FortiManager version 5.6.11 or above Please upgrade to FortiAnalyzer version 7.0.1 or above Please upgrade to FortiAnalyzer version 6.4.6 or above Please upgrade to FortiAnalyzer version 6.2.8 or above Please upgrade to FortiAnalyzer version 6.0.11 or above Please upgrade to FortiAnalyzer version 5.6.11 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32589 has been assigned a high severity rating due to potential exploitation leading to unauthorized access.
To fix CVE-2021-32589, upgrade FortiManager and FortiAnalyzer to versions that are not vulnerable, specifically versions greater than 6.4.6, 6.2.8, 6.0.11, 5.6.11, 5.4.8, 5.2.11, and 5.0.13.
CVE-2021-32589 affects FortiManager versions 7.0.0, 6.4.5 and below, and FortiAnalyzer versions 7.0.0, 6.4.5 and below.
CVE-2021-32589 is classified as a Use After Free vulnerability (CWE-416) which can lead to serious security issues.
While details regarding active exploits for CVE-2021-32589 are not publicly detailed, the high severity rating suggests potential for exploitation.