Vulnerability Details : CVE-2021-22131
A improper validation of certificate with host mismatch in Fortinet FortiTokenAndroid version 5.0.3 and below, Fortinet FortiTokeniOS version 5.2.0 and below, Fortinet FortiTokenWinApp version 4.0.3 and below allows attacker to retrieve information disclosed via man-in-the-middle attacks.
Exploit prediction scoring system (EPSS) score for CVE-2021-22131
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 14 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-22131
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.4
|
MEDIUM | CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N |
1.2
|
4.2
|
NIST |
6.4
|
MEDIUM | CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H |
1.2
|
5.2
|
Fortinet, Inc. |
CWE ids for CVE-2021-22131
-
The product does not validate, or incorrectly validates, a certificate.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-22131
-
https://fortiguard.com/advisory/FG-IR-21-024
PSIRT Advisories | FortiGuardPatch;Vendor Advisory
Products affected by CVE-2021-22131
- cpe:2.3:a:fortinet:fortitoken_mobile:4.0.0:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:4.0.1:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:4.1.1:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:4.2.1:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:4.2.2:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:4.3.0:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:4.4.0:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:4.5.0:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:5.0.2:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:5.0.3:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:4.0.3:*:*:*:*:windows:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:3.0.1:*:*:*:*:windows:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:3.0.0:*:*:*:*:windows:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:5.2.0:*:*:*:*:ios:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:4.3.0:*:*:*:*:ios:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:4.2.0:*:*:*:*:ios:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:4.1.1:*:*:*:*:ios:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:4.1.0:*:*:*:*:ios:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:3.0.5:*:*:*:*:ios:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:3.0.4:*:*:*:*:ios:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:3.0.3:*:*:*:*:ios:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:3.0.2:*:*:*:*:ios:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:3.0.1:*:*:*:*:ios:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:3.0.4:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:3.0.3:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:3.0.2:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:3.0.1:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:3.0.0:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:0.4.20:*:*:*:*:android:*:*
- cpe:2.3:a:fortinet:fortitoken_mobile:0.4.10:*:*:*:*:android:*:*