fkie_cve-2021-43204
Vulnerability from fkie_nvd
Published
2021-12-09 09:15
Modified
2024-11-21 06:28
Severity ?
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Summary
A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/advisory/FG-IR-21-167 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/advisory/FG-IR-21-167 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fortinet | forticlient | * | |
fortinet | forticlient | * | |
fortinet | forticlient | * | |
fortinet | forticlient | * | |
fortinet | forticlient | * | |
fortinet | forticlient | 4.0.1 | |
fortinet | forticlient | 4.0.2 | |
fortinet | forticlient | 4.0.3 | |
fortinet | forticlient | 4.0.4 | |
fortinet | forticlient | 4.1.0 | |
fortinet | forticlient | 4.1.1 | |
fortinet | forticlient | 4.1.2 | |
fortinet | forticlient | 4.1.3 | |
fortinet | forticlient | 4.2.0 | |
fortinet | forticlient | 4.2.1 | |
fortinet | forticlient | 4.2.2 | |
fortinet | forticlient | 4.2.3 | |
fortinet | forticlient | 4.2.4 | |
fortinet | forticlient | 4.2.5 | |
fortinet | forticlient | 4.2.6 | |
fortinet | forticlient | 4.2.7 | |
fortinet | forticlient | 4.3.0 | |
fortinet | forticlient | 4.3.1 | |
fortinet | forticlient | 4.3.2 | |
fortinet | forticlient | 4.3.3 | |
fortinet | forticlient | 4.3.4 | |
fortinet | forticlient | 4.3.5 | |
fortinet | forticlient | 5.2.0 | |
fortinet | forticlient | 5.2.1 | |
fortinet | forticlient | 5.2.2 | |
fortinet | forticlient | 5.2.3 | |
fortinet | forticlient | 5.2.4 | |
fortinet | forticlient | 5.2.5 | |
fortinet | forticlient | 5.2.6 | |
fortinet | forticlient | 6.4.0 | |
fortinet | forticlient | 6.4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", "matchCriteriaId": "C862F0D6-7BA9-4064-8536-D3BF549F0B52", "versionEndIncluding": "5.0.11", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A7941A14-836D-4016-B910-5292AA79D60D", "versionEndIncluding": "5.4.5", "versionStartIncluding": "5.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", "matchCriteriaId": "14570EAA-2D79-45DC-BABD-0174658C8738", "versionEndIncluding": "5.6.6", "versionStartIncluding": "5.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", "matchCriteriaId": "99B02B5E-89EF-46E5-8EC4-98AC8FB5CAFC", "versionEndIncluding": "6.0.10", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", "matchCriteriaId": "C5601CD7-A7CE-4FC5-A635-B20B415DC8C4", "versionEndIncluding": "6.2.9", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.0.1:*:*:*:*:windows:*:*", "matchCriteriaId": "96BCEBCD-39E1-4889-BB2B-BF988A693F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.0.2:*:*:*:*:windows:*:*", "matchCriteriaId": "7969D4A9-CA2A-4D10-9530-CFCC30FACAB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.0.3:*:*:*:*:windows:*:*", "matchCriteriaId": "E1F57C30-B25E-4849-A2EB-5C3CBEECF67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.0.4:*:*:*:*:windows:*:*", "matchCriteriaId": "D4460267-4A26-4C0B-AF50-675153FC99A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.1.0:*:*:*:*:windows:*:*", "matchCriteriaId": "67A07CC6-0AA4-429D-BF17-8F431254D9B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.1.1:*:*:*:*:windows:*:*", "matchCriteriaId": "D331BC30-504F-4431-B329-DBD9639EAE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.1.2:*:*:*:*:windows:*:*", "matchCriteriaId": "61398D1E-FC1A-4D1B-B202-E0E4ABD565E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.1.3:*:*:*:*:windows:*:*", "matchCriteriaId": "E60E37E5-D1B9-4F46-AFCC-2D8B124CA741", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.0:*:*:*:*:windows:*:*", "matchCriteriaId": "365988CE-3AAC-43CA-98B5-9CDD20672AA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.1:*:*:*:*:windows:*:*", "matchCriteriaId": "914F0153-831A-44B3-9990-9066D46CED68", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.2:*:*:*:*:windows:*:*", "matchCriteriaId": "81CD48E3-DC5B-4572-A63F-6D7EE9B34DD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.3:*:*:*:*:windows:*:*", "matchCriteriaId": "61576917-A85A-4509-9B7F-B9A7900C1A65", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.4:*:*:*:*:windows:*:*", "matchCriteriaId": "D2700E55-B7C9-4DA9-A6E8-1662A2E9130B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.5:*:*:*:*:windows:*:*", "matchCriteriaId": "DACFE873-F65E-40B1-B95F-E27695D9D958", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.6:*:*:*:*:windows:*:*", "matchCriteriaId": "DEACFA3A-B144-45A4-9D59-1C0FB019D4A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.7:*:*:*:*:windows:*:*", "matchCriteriaId": "58F85212-999B-484F-8D68-D423CC612CA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.3.0:*:*:*:*:windows:*:*", "matchCriteriaId": "ECF43D36-58BC-40FB-9BEE-DE8F2111B183", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.3.1:*:*:*:*:windows:*:*", "matchCriteriaId": "D41B7F2F-E0EC-4B1B-BA18-ABC07A52C3EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.3.2:*:*:*:*:windows:*:*", "matchCriteriaId": "522F0516-82F3-42A2-9AC1-A95525F9E7A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.3.3:*:*:*:*:windows:*:*", "matchCriteriaId": "6EC731B9-49B3-4844-80DB-FF4C95A7902F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.3.4:*:*:*:*:windows:*:*", "matchCriteriaId": "86CF9C71-1A41-45E6-8277-B0AB3D9BB280", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:4.3.5:*:*:*:*:windows:*:*", "matchCriteriaId": "27509B90-F015-4D23-A00C-6F5ABEF28E9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.0:*:*:*:*:windows:*:*", "matchCriteriaId": "11A531A9-AE81-49BB-977D-C6355EDE4E29", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.1:*:*:*:*:windows:*:*", "matchCriteriaId": "AEFFEFF8-9998-44D5-B154-F2233BF3246F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.2:*:*:*:*:windows:*:*", "matchCriteriaId": "3B58C558-77BC-4A90-8892-A9EC7FF841CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.3:*:*:*:*:windows:*:*", "matchCriteriaId": "12D8687C-5086-4A8B-AF5D-0A5A2818685E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.4:*:*:*:*:windows:*:*", "matchCriteriaId": "E10669AD-BB00-4F79-9E47-3CD0C768BB26", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.5:*:*:*:*:windows:*:*", "matchCriteriaId": "8D52A748-EA79-46A7-9BA3-849222A89D70", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.6:*:*:*:*:windows:*:*", "matchCriteriaId": "267AD2B3-75DE-454F-9A9A-8C47610BAD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:6.4.0:*:*:*:*:windows:*:*", "matchCriteriaId": "F6540A80-C6CF-4DF7-A815-62BCACA093D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:6.4.1:*:*:*:*:windows:*:*", "matchCriteriaId": "3237811F-5AC5-49AB-A1F5-EEB04A7C049D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions." }, { "lang": "es", "value": "Un control inapropiado de un recurso a lo largo de su vida en Fortinet FortiClientWindows versi\u00f3n 6.4.1 y 6.4.0, versi\u00f3n 6.2.9 y anteriores, versi\u00f3n 6.0.10 y anteriores, permite a un atacante causar una denegaci\u00f3n de servicio completa de sus componentes por medio de cambios en los permisos de acceso al directorio" } ], "id": "CVE-2021-43204", "lastModified": "2024-11-21T06:28:50.483", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "psirt@fortinet.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-09T09:15:07.080", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://fortiguard.com/advisory/FG-IR-21-167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://fortiguard.com/advisory/FG-IR-21-167" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.