CVE-2021-26103
Severity
8.8HIGH
EPSS
0.3%
top 47.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 8
Latest updateDec 9
Description
An insufficient verification of data authenticity vulnerability (CWE-345) in the user interface of FortiProxy verison 2.0.3 and below, 1.2.11 and below and FortiGate verison 7.0.0, 6.4.6 and below, 6.2.9 and below of SSL VPN portal may allow a remote, unauthenticated attacker to conduct a cross-site request forgery (CSRF) attack . Only SSL VPN in web mode or full mode are impacted by this vulnerability.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:LExploitability: 2.8 | Impact: 3.4
Affected Packages3 packages
▶CVEListV5fortinet/fortinet_fortiosFortiOS 7.0.0, 6.4.5, 6.4.4, 6.4.3, 6.4.2, 6.4.1, 6.4.0, 6.2.9, 6.2.8, 6.2.7, 6.2.6, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.0.14, 6.0.13, 6.0.12, 6.0.11, 6.0.10, 6.0.9, 6.0.8, 6.0.7, 6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0, 5.6.14, 5.6.13, 5.6.12, 5.6.11, 5.6.10, 5.6.9, 5.6.8, 5.6.7, 5.6.6, 5.6.5, 5.6.4, 5.6.3, 5.6.2, 5.6.1, 5.6.0
Patches
🔴Vulnerability Details
2GHSA▶
GHSA-wp9j-fhh7-35qv: An insufficient verification of data authenticity vulnerability (CWE-345) in the user interface of FortiProxy verison 2↗2021-12-09
CVEList▶
CVE-2021-26103: An insufficient verification of data authenticity vulnerability (CWE-345) in the user interface of FortiProxy verison 2↗2021-12-08
📋Vendor Advisories
1Fortinet▶
An insufficient verification of data authenticity vulnerability (CWE-345) in the user interface of FortiProxy verison 2...↗2021-12-08