First published: Tue Feb 01 2022(Updated: )
A improper neutralization of special elements used in a command ('command injection') in Fortinet FortiExtender version 7.0.1 and below, 4.2.3 and below, 4.1.7 and below allows an authenticated attacker to execute privileged shell commands via CLI commands including special characters
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiextender Firmware | >=4.1.1<4.1.8 | |
Fortinet Fortiextender Firmware | >=4.2.0<4.2.4 | |
Fortinet Fortiextender Firmware | >=7.0.0<7.0.2 | |
Fortinet FortiExtender |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41016 has been classified as a critical severity vulnerability due to its potential to allow unauthorized command execution.
To mitigate CVE-2021-41016, upgrade Fortinet FortiExtender firmware to version 4.1.8 or later, 4.2.4 or later, or 7.0.2 or later.
CVE-2021-41016 affects users running Fortinet FortiExtender firmware versions 7.0.1 and below, 4.2.3 and below, or 4.1.7 and below.
CVE-2021-41016 allows authenticated attackers to execute privileged shell commands through command injection.
CVE-2021-41016 is a local vulnerability, as it requires authentication to exploit.