fkie_cve-2021-43204
Vulnerability from fkie_nvd
Published
2021-12-09 09:15
Modified
2024-11-21 06:28
Summary
A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "C862F0D6-7BA9-4064-8536-D3BF549F0B52",
              "versionEndIncluding": "5.0.11",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "A7941A14-836D-4016-B910-5292AA79D60D",
              "versionEndIncluding": "5.4.5",
              "versionStartIncluding": "5.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "14570EAA-2D79-45DC-BABD-0174658C8738",
              "versionEndIncluding": "5.6.6",
              "versionStartIncluding": "5.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "99B02B5E-89EF-46E5-8EC4-98AC8FB5CAFC",
              "versionEndIncluding": "6.0.10",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "C5601CD7-A7CE-4FC5-A635-B20B415DC8C4",
              "versionEndIncluding": "6.2.9",
              "versionStartIncluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.0.1:*:*:*:*:windows:*:*",
              "matchCriteriaId": "96BCEBCD-39E1-4889-BB2B-BF988A693F36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.0.2:*:*:*:*:windows:*:*",
              "matchCriteriaId": "7969D4A9-CA2A-4D10-9530-CFCC30FACAB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.0.3:*:*:*:*:windows:*:*",
              "matchCriteriaId": "E1F57C30-B25E-4849-A2EB-5C3CBEECF67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.0.4:*:*:*:*:windows:*:*",
              "matchCriteriaId": "D4460267-4A26-4C0B-AF50-675153FC99A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.1.0:*:*:*:*:windows:*:*",
              "matchCriteriaId": "67A07CC6-0AA4-429D-BF17-8F431254D9B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.1.1:*:*:*:*:windows:*:*",
              "matchCriteriaId": "D331BC30-504F-4431-B329-DBD9639EAE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.1.2:*:*:*:*:windows:*:*",
              "matchCriteriaId": "61398D1E-FC1A-4D1B-B202-E0E4ABD565E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.1.3:*:*:*:*:windows:*:*",
              "matchCriteriaId": "E60E37E5-D1B9-4F46-AFCC-2D8B124CA741",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.0:*:*:*:*:windows:*:*",
              "matchCriteriaId": "365988CE-3AAC-43CA-98B5-9CDD20672AA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.1:*:*:*:*:windows:*:*",
              "matchCriteriaId": "914F0153-831A-44B3-9990-9066D46CED68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.2:*:*:*:*:windows:*:*",
              "matchCriteriaId": "81CD48E3-DC5B-4572-A63F-6D7EE9B34DD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.3:*:*:*:*:windows:*:*",
              "matchCriteriaId": "61576917-A85A-4509-9B7F-B9A7900C1A65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.4:*:*:*:*:windows:*:*",
              "matchCriteriaId": "D2700E55-B7C9-4DA9-A6E8-1662A2E9130B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.5:*:*:*:*:windows:*:*",
              "matchCriteriaId": "DACFE873-F65E-40B1-B95F-E27695D9D958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.6:*:*:*:*:windows:*:*",
              "matchCriteriaId": "DEACFA3A-B144-45A4-9D59-1C0FB019D4A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.2.7:*:*:*:*:windows:*:*",
              "matchCriteriaId": "58F85212-999B-484F-8D68-D423CC612CA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.3.0:*:*:*:*:windows:*:*",
              "matchCriteriaId": "ECF43D36-58BC-40FB-9BEE-DE8F2111B183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.3.1:*:*:*:*:windows:*:*",
              "matchCriteriaId": "D41B7F2F-E0EC-4B1B-BA18-ABC07A52C3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.3.2:*:*:*:*:windows:*:*",
              "matchCriteriaId": "522F0516-82F3-42A2-9AC1-A95525F9E7A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.3.3:*:*:*:*:windows:*:*",
              "matchCriteriaId": "6EC731B9-49B3-4844-80DB-FF4C95A7902F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.3.4:*:*:*:*:windows:*:*",
              "matchCriteriaId": "86CF9C71-1A41-45E6-8277-B0AB3D9BB280",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:4.3.5:*:*:*:*:windows:*:*",
              "matchCriteriaId": "27509B90-F015-4D23-A00C-6F5ABEF28E9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.0:*:*:*:*:windows:*:*",
              "matchCriteriaId": "11A531A9-AE81-49BB-977D-C6355EDE4E29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.1:*:*:*:*:windows:*:*",
              "matchCriteriaId": "AEFFEFF8-9998-44D5-B154-F2233BF3246F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.2:*:*:*:*:windows:*:*",
              "matchCriteriaId": "3B58C558-77BC-4A90-8892-A9EC7FF841CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.3:*:*:*:*:windows:*:*",
              "matchCriteriaId": "12D8687C-5086-4A8B-AF5D-0A5A2818685E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.4:*:*:*:*:windows:*:*",
              "matchCriteriaId": "E10669AD-BB00-4F79-9E47-3CD0C768BB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.5:*:*:*:*:windows:*:*",
              "matchCriteriaId": "8D52A748-EA79-46A7-9BA3-849222A89D70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:5.2.6:*:*:*:*:windows:*:*",
              "matchCriteriaId": "267AD2B3-75DE-454F-9A9A-8C47610BAD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:6.4.0:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F6540A80-C6CF-4DF7-A815-62BCACA093D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:forticlient:6.4.1:*:*:*:*:windows:*:*",
              "matchCriteriaId": "3237811F-5AC5-49AB-A1F5-EEB04A7C049D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions."
    },
    {
      "lang": "es",
      "value": "Un control inapropiado de un recurso a lo largo de su vida en Fortinet FortiClientWindows versi\u00f3n 6.4.1 y 6.4.0, versi\u00f3n 6.2.9 y anteriores, versi\u00f3n 6.0.10 y anteriores, permite a un atacante causar una denegaci\u00f3n de servicio completa de sus componentes por medio de cambios en los permisos de acceso al directorio"
    }
  ],
  "id": "CVE-2021-43204",
  "lastModified": "2024-11-21T06:28:50.483",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 4.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "psirt@fortinet.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-12-09T09:15:07.080",
  "references": [
    {
      "source": "psirt@fortinet.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://fortiguard.com/advisory/FG-IR-21-167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://fortiguard.com/advisory/FG-IR-21-167"
    }
  ],
  "sourceIdentifier": "psirt@fortinet.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.