First published: Wed Sep 08 2021(Updated: )
A stack-based buffer overflow in Fortinet FortiWeb version 6.3.14 and below, 6.2.4 and below allows attacker to execute unauthorized code or commands via crafted parameters in CLI command execution
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | <=6.2.4 | |
Fortinet FortiWeb | >=6.3.0<=6.3.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36179 is rated as high severity due to the possibility of a stack-based buffer overflow leading to unauthorized code execution.
To mitigate CVE-2021-36179, users should upgrade Fortinet FortiWeb to versions above 6.3.14 or 6.2.5.
CVE-2021-36179 affects Fortinet FortiWeb versions 6.3.14 and below, and 6.2.4 and below.
CVE-2021-36179 is a stack-based buffer overflow vulnerability that allows an attacker to execute unauthorized commands.
Yes, CVE-2021-36179 can be exploited remotely by attackers through crafted parameters in CLI command execution.