First published: Tue May 03 2022(Updated: )
An improper access control vulnerability [CWE-284] in FortiOS may allow an authenticated attacker with a restricted user profile to gather sensitive information and modify the SSL-VPN tunnel status of other VDOMs using specific CLI commands.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | >=6.2.0<6.4.9 | |
Fortinet FortiOS | >=7.0.0<7.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41032 is considered a high-severity vulnerability due to its potential impact on sensitive information and control over SSL-VPN tunnel statuses.
To mitigate CVE-2021-41032, it is recommended to upgrade FortiOS to a patched version beyond 6.4.9 or 7.0.4.
CVE-2021-41032 affects FortiOS versions between 6.2.0 and 6.4.9 as well as versions from 7.0.0 to 7.0.4.
CVE-2021-41032 can be exploited by authenticated attackers with restricted user profiles to gather sensitive information and modify settings.
CVE-2021-41032 represents an improper access control vulnerability that allows unauthorized access to specific CLI commands.