
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer overflow vulnerability was identified in FortiAnalyzer and FortiManager CLI systems, tracked as CVE-2021-24022. The vulnerability affects FortiAnalyzer versions 6.4.5 and below, 6.2.7 and below, 6.0.x, and FortiManager versions 6.4.5 and below, 6.2.7 and below, 6.0.x. The issue was disclosed on July 7, 2021, and received a medium severity rating with a CVSSv3 score of 6.1 (FortiGuard PSIRT).
The vulnerability exists in the IP parameter of the 'diagnose system geoip-city ip' CLI command. When an authenticated local user inputs a large IP value to this command, it can trigger a buffer overflow condition. The vulnerability has been assigned a medium severity rating with a CVSS score of 6.1, indicating moderate potential impact (FortiGuard PSIRT).
If successfully exploited, this vulnerability could allow an authenticated, local attacker to perform a Denial of Service (DoS) attack. Fortinet has stated that they are not aware of any successful exploitation of this vulnerability that would lead to code execution (FortiGuard PSIRT).
Fortinet has released patches to address this vulnerability. Users are advised to upgrade to FortiAnalyzer version 7.0.0 or above, version 6.4.6 or above, or version 6.2.8 or above. For FortiManager, users should upgrade to version 7.0.0 or above, version 6.4.6 or above, or version 6.2.8 or above (FortiGuard PSIRT).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."