
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-32589 is a Use After Free (CWE-416) vulnerability affecting FortiManager and FortiAnalyzer products. The vulnerability was discovered in July 2021 and affects multiple versions of FortiManager (from 5.0 to 7.0.0) and FortiAnalyzer (from 5.2.4 to 7.0.0). This security flaw exists in the fgfmsd daemon of these products and could potentially allow remote, unauthenticated attackers to execute unauthorized code with root privileges (Fortinet Advisory).
The vulnerability is classified as a Use After Free (CWE-416) issue in the fgfmsd daemon. It received a CVSS v3.1 base score of 9.8 (Critical) from NVD and 8.1 (High) from Fortinet. The vulnerability can be exploited by sending a specifically crafted request to the fgfm port of the targeted device. For FortiAnalyzer, it's important to note that FGFM is disabled by default and can only be enabled on specific hardware models: 1000D, 1000E, 2000E, 3000D, 3000E, 3000F, 3500E, 3500F, 3700F, 3900E (Fortinet Advisory).
If successfully exploited, this vulnerability allows an attacker to execute unauthorized code with root privileges on the affected system. Given the critical nature of FortiManager as a central management platform for many organizations, the potential impact is severe as it could lead to complete system compromise (Fortinet Blog).
Fortinet has released patches for all affected versions and strongly recommends immediate updates. For FortiAnalyzer users, a temporary workaround is available by disabling FortiManager features using the command 'config system global set fmg-status disable'. Additionally, as a temporary mitigation before updating, users can employ a FortiGate in front of the device with IPS definitions 18.100 or later and set the FortiGate IPS signature FG-VD-50483 to block (Fortinet Advisory).
Fortinet took extraordinary steps to notify customers before issuing the public advisory, including sending email notifications to primary account owners of all FortiManager devices and issuing a Customer Support Bulletin. The company also collaborated with CISA and other agencies to ensure broad communication of the vulnerability (Fortinet Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."