First published: Wed Dec 08 2021(Updated: )
An authentication bypass by capture-replay vulnerability [CWE-294] in FortiClient EMS versions 7.0.1 and below and 6.4.4 and below may allow an unauthenticated attacker to impersonate an existing user by intercepting and re-using valid SAML authentication messages.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Enterprise Management Server | >=6.2.0<=6.2.9 | |
Fortinet FortiClient Enterprise Management Server | >=6.4.0<=6.4.4 | |
Fortinet FortiClient Enterprise Management Server | =7.0.0 | |
Fortinet FortiClient Enterprise Management Server | =7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41030 is an authentication bypass by capture-replay vulnerability in FortiClient EMS versions 7.0.1 and below and 6.4.4 and below.
CVE-2021-41030 may allow an unauthenticated attacker to impersonate an existing user by intercepting and re-using valid SAML authentication messages in FortiClient EMS.
FortiClient EMS versions 7.0.1 and below and 6.4.4 and below are affected by CVE-2021-41030.
CVE-2021-41030 has a severity rating of critical (9.1).
To mitigate the vulnerability, it is recommended to upgrade FortiClient EMS to a version that is not affected by CVE-2021-41030.