Wiz Agents & Workflows are here

CVE-2021-43065
FortiNAC vulnerability analysis and mitigation

Overview

A incorrect permission assignment for critical resource vulnerability (CVE-2021-43065) was discovered in Fortinet FortiNAC versions 9.2.0, 9.1.3 and below, and 8.8.9 and below. The vulnerability was disclosed on December 9, 2021, affecting Fortinet FortiNAC's configuration system (NVD, Fortinet Advisory).

Technical details

The vulnerability stems from improper permission settings on a tomcat configuration file that contains sensitive credentials. An unprivileged SSH user can read the login and password of the FortiNAC Configuration Wizard (accessible at https://:8443/configWizard) stored in cleartext in the /bsc/services/tomcat-admin/conf/tomcat-users.xml file. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access with low complexity and privileges required (Github Advisory).

Impact

The vulnerability allows an authenticated attacker to access sensitive system data and potentially elevate their privileges to admin level. Once an attacker gains access to the Configuration Wizard, they can modify parameters that could lead to denial of service or change the configuration password, preventing legitimate administrator access (Github Advisory).

Mitigation and workarounds

Fortinet has released patches to address this vulnerability. Users are advised to upgrade to one of the following versions: FortiNAC version 10.0.0 or above, FortiNAC version 9.2.1 or above, FortiNAC version 9.1.4 or above, or FortiNAC version 8.8.10 or above. There are no workarounds available for this vulnerability (Github Advisory).

Additional resources


SourceThis report was generated using AI

Related FortiNAC vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-33299CRITICAL9.8
  • FortiNACFortiNAC
  • cpe:2.3:a:fortinet:fortinac
NoYesJun 23, 2023
CVE-2024-31488CRITICAL9
  • FortiNACFortiNAC
  • cpe:2.3:a:fortinet:fortinac
NoYesMay 14, 2024
CVE-2023-22633HIGH7.5
  • FortiNACFortiNAC
  • cpe:2.3:a:fortinet:fortinac
NoYesJun 13, 2023
CVE-2023-26206MEDIUM6.1
  • FortiNACFortiNAC
  • cpe:2.3:a:fortinet:fortinac
NoYesFeb 15, 2024
CVE-2023-33300MEDIUM5.3
  • FortiNACFortiNAC
  • cpe:2.3:a:fortinet:fortinac
NoYesMar 14, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management