First published: Wed Dec 08 2021(Updated: )
Multiple heap-based buffer overflow vulnerabilities in some web API controllers of FortiWeb 6.4.1, 6.4.0, and 6.3.0 through 6.3.15 may allow a remote authenticated attacker to execute arbitrary code or commands via specifically crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.3.0<=6.3.15 | |
Fortinet FortiWeb | =6.4.0 | |
Fortinet FortiWeb | =6.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for these heap-based buffer overflow vulnerabilities is CVE-2021-41017.
The affected software for these vulnerabilities is FortiWeb versions 6.3.0 through 6.3.15, 6.4.0, and 6.4.1.
The severity of CVE-2021-41017 is rated as high with a CVSS score of 8.8.
A remote authenticated attacker can exploit these vulnerabilities by sending specifically crafted HTTP requests to the affected web API controllers.
Yes, Fortinet has released patches and updates to address these vulnerabilities. It is recommended to update to the latest version of FortiWeb to mitigate the risk.