First published: Wed Mar 02 2022(Updated: )
An improper access control vulnerability [CWE-284 ] in FortiToken Mobile (Android) external push notification 5.1.0 and below may allow a remote attacker having already obtained a user's password to access the protected system during the 2FA procedure, even though the deny button is clicked by the legitimate user.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortitoken Mobile | =4.0.0 | |
Fortinet Fortitoken Mobile | =4.0.1 | |
Fortinet Fortitoken Mobile | =4.1.1 | |
Fortinet Fortitoken Mobile | =4.2.1 | |
Fortinet Fortitoken Mobile | =4.2.2 | |
Fortinet Fortitoken Mobile | =4.3.0 | |
Fortinet Fortitoken Mobile | =4.4.0 | |
Fortinet Fortitoken Mobile | =4.5.0 | |
Fortinet Fortitoken Mobile | =5.0.2 | |
Fortinet Fortitoken Mobile | =5.0.3 | |
Fortinet Fortitoken Mobile | =5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44166 is rated as medium with a CVSS score of 4.1.
FortiToken Mobile versions 4.0.0 to 5.1.0 on Android are affected by CVE-2021-44166.
To mitigate CVE-2021-44166, users should update FortiToken Mobile to a version that patches this vulnerability as soon as possible.