First published: Thu Dec 09 2021(Updated: )
A heap-based buffer overflow in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests to the LogReport API controller.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.2.0<=6.2.6 | |
Fortinet FortiWeb | >=6.3.0<=6.3.16 | |
Fortinet FortiWeb | =6.4.0 | |
Fortinet FortiWeb | =6.4.1 | |
>=6.2.0<=6.2.6 | ||
>=6.3.0<=6.3.16 | ||
=6.4.0 | ||
=6.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43071 is a heap-based buffer overflow vulnerability in Fortinet FortiWeb.
Fortinet FortiWeb versions 6.4.1, 6.4.0, 6.3.15 and below, and 6.2.6 and below are affected.
CVE-2021-43071 has a severity score of 8.8, which is classified as high.
An attacker can exploit CVE-2021-43071 by sending crafted HTTP requests to the LogReport API controller.
Yes, Fortinet has released patches and updates to fix CVE-2021-43071. Please refer to the Fortinet advisory for more information.