Description: A stack-based buffer overflow vulnerability in FortiProxy physical appliance CLI 2.0.0 to 2.0.1, 1.2.0 to 1.2.9, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 may allow an authenticated, remote attacker to perform a Denial of Service attack by running the `diagnose sys cpuset` with a large cpuset mask value. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.
CVE-2021-22130
Published Date: 2021-06-03T11:15Z
Last Modified: 2021-06-11T17:11Z
CVSS Score: 4.9 (MEDIUM)
EPSS Score: 0.20%
Risk Score: 3.43 (MEDIUM)
Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.
CVSS:
4.9 |
EPSS:
0.2%
Mitre ATT&CK Technical v15.1
T1090 – Proxy
T1053.002 – At
Technical Analysis & Mitigation Measures
Reference Links
Vendor - Produce - Version
fortiproxy - fortinet, fortiproxy - fortinet, fortiproxy - fortinet, fortiproxy - fortinet
Disclaimer
The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.