First published: Tue Sep 07 2021(Updated: )
A debug functionality in FortiGate may allow a privileged user to execute unauthorized code or commands via specificchains of print str and cmd mem cli commands to, respectively, read and write hexadecimal values to any memory address.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortigate |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-21-091 vulnerability has been classified with a high severity due to its potential to allow privileged users to execute unauthorized commands.
To fix FG-IR-21-091, apply the latest security patches provided by Fortinet for the FortiGate product.
FG-IR-21-091 affects Fortinet FortiGate devices that have debug functionality enabled.
The potential impacts of FG-IR-21-091 include unauthorized access to sensitive memory areas and potential execution of arbitrary code.
No, FG-IR-21-091 is not a remote vulnerability; it requires a privileged user to exploit the debug functionality.