CVE-2021-22130

Sep 3, 2024

Published Date: 2021-06-03T11:15Z
Last Modified: 2021-06-11T17:11Z

CVSS Score: 4.9 (MEDIUM)

EPSS Score: 0.20%

Risk Score: 3.43 (MEDIUM)

Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.

Meter Needle
CVSS: 4.9  |  EPSS: 0.2%

Description: A stack-based buffer overflow vulnerability in FortiProxy physical appliance CLI 2.0.0 to 2.0.1, 1.2.0 to 1.2.9, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 may allow an authenticated, remote attacker to perform a Denial of Service attack by running the `diagnose sys cpuset` with a large cpuset mask value. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.

Mitre ATT&CK Technical v15.1

T1090 – Proxy
T1053.002 – At

Technical Analysis & Mitigation Measures

Reference Links

Vendor - Produce - Version

fortiproxy - fortinet, fortiproxy - fortinet, fortiproxy - fortinet, fortiproxy - fortinet

Disclaimer

The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.