First published: Tue Mar 01 2022(Updated: )
The use of a cryptographically weak pseudo-random number generator in the password reset feature of FortiPortal before 6.0.6 may allow a remote unauthenticated attacker to predict parts of or the whole newly generated password within a given time frame.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiPortal | <=4.0.4 | |
Fortinet FortiPortal | >=4.1.0<=4.1.2 | |
Fortinet FortiPortal | >=4.2.0<=4.2.4 | |
Fortinet FortiPortal | >=5.0.0<=5.0.3 | |
Fortinet FortiPortal | >=5.1.0<=5.1.2 | |
Fortinet FortiPortal | >=5.2.0<5.2.7 | |
Fortinet FortiPortal | >=5.3.0<5.3.7 | |
Fortinet FortiPortal | >=6.0.0<6.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-36171.
The severity of CVE-2021-36171 is high.
The affected software for CVE-2021-36171 is Fortinet FortiPortal versions up to and including 6.0.6.
CVE-2021-36171 is a vulnerability that allows a remote unauthenticated attacker to predict parts or the whole newly generated password in the password reset feature of FortiPortal before version 6.0.6 due to the use of a weak pseudo-random number generator.
Yes, a fix is available for CVE-2021-36171. It is recommended to update FortiPortal to version 6.0.6 or later to address this vulnerability.