CVE-2021-26103

CWE-3454 documents4 sources
Severity
8.8HIGH
EPSS
0.3%
top 47.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8
Latest updateDec 9

Description

An insufficient verification of data authenticity vulnerability (CWE-345) in the user interface of FortiProxy verison 2.0.3 and below, 1.2.11 and below and FortiGate verison 7.0.0, 6.4.6 and below, 6.2.9 and below of SSL VPN portal may allow a remote, unauthenticated attacker to conduct a cross-site request forgery (CSRF) attack . Only SSL VPN in web mode or full mode are impacted by this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:LExploitability: 2.8 | Impact: 3.4

Affected Packages3 packages

NVDfortinet/fortiproxy1.2.01.2.11+1
NVDfortinet/fortios5.6.05.6.14+4
CVEListV5fortinet/fortinet_fortiosFortiOS 7.0.0, 6.4.5, 6.4.4, 6.4.3, 6.4.2, 6.4.1, 6.4.0, 6.2.9, 6.2.8, 6.2.7, 6.2.6, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.0.14, 6.0.13, 6.0.12, 6.0.11, 6.0.10, 6.0.9, 6.0.8, 6.0.7, 6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0, 5.6.14, 5.6.13, 5.6.12, 5.6.11, 5.6.10, 5.6.9, 5.6.8, 5.6.7, 5.6.6, 5.6.5, 5.6.4, 5.6.3, 5.6.2, 5.6.1, 5.6.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-wp9j-fhh7-35qv: An insufficient verification of data authenticity vulnerability (CWE-345) in the user interface of FortiProxy verison 22021-12-09
CVEList
CVE-2021-26103: An insufficient verification of data authenticity vulnerability (CWE-345) in the user interface of FortiProxy verison 22021-12-08

📋Vendor Advisories

1
Fortinet
An insufficient verification of data authenticity vulnerability (CWE-345) in the user interface of FortiProxy verison 2...2021-12-08