
Cloud Vulnerability DB
A community-led vulnerabilities database
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] was discovered in FortiClientEMS management interface. The vulnerability affects FortiClientEMS versions 7.0.0 through 7.0.4, 7.0.6 through 7.0.7, and all versions in the 6.4 and 6.2 series. This vulnerability was assigned CVE-2021-44172 and was publicly disclosed on September 13, 2023 (Fortinet PSIRT).
The vulnerability allows an unauthenticated attacker to gain information about environment variables, specifically the EMS installation path, through the sign-in homepage. The vulnerability has been assigned a CVSS v3.1 base score of 5.3 (Medium) by NVD and 4.3 (Medium) by Fortinet, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (NVD).
The successful exploitation of this vulnerability could lead to the disclosure of sensitive information about the system environment, specifically the EMS installation path. This information could potentially be used by attackers for further targeting or exploitation attempts (Fortinet PSIRT).
Fortinet has released fixes for the affected versions. Users of FortiClientEMS 7.0.x should upgrade to version 7.0.8 or above. Users of FortiClientEMS 6.4 and 6.2 versions should migrate to a fixed release. FortiClientEMS 7.2 is not affected by this vulnerability (Fortinet PSIRT).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."