| |
Vulnerability CVE-2021-41028
Published: 2021-12-16
Description: |
A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol. |
Type:
CWE-798
CVSS2 => (AV:A/AC:M/Au:N/C:P/I:P/A:P)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
5.4/10 |
6.4/10 |
5.5/10 |
Exploit range |
Attack complexity |
Authentication |
Adjacent network |
Medium |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
Partial |
Partial |
References: |
https://fortiguard.com/advisory/FG-IR-21-075
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|