First published: Tue Sep 07 2021(Updated: )
A debug functionality in FortiGate may allow a privileged user to execute unauthorized code or commands via specificchains of print str and cmd mem cli commands to, respectively, read and write hexadecimal values to any memory address.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | >=5.6.0<=5.6.14 | |
Fortinet FortiOS | >=6.0.0<=6.0.14 | |
Fortinet FortiOS | >=6.2.0<6.2.10 | |
Fortinet FortiOS | >=6.4.0<6.4.7 | |
Fortinet FortiOS | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36169 is classified as a high severity vulnerability due to its potential to allow unauthorized code execution.
To fix CVE-2021-36169, upgrade FortiOS to a version that is not affected by this vulnerability.
CVE-2021-36169 affects multiple versions of FortiOS, including 5.6.0 to 5.6.14, 6.0.0 to 6.0.14, 6.2.0 to 6.2.10, 6.4.0 to 6.4.7, and 7.0.0.
Exploitation of CVE-2021-36169 can allow a privileged user to read and write to any memory address, potentially enabling various malicious attacks.
Organizations using affected versions of FortiGate devices and FortiOS software are primarily at risk from CVE-2021-36169.