Vulnerability Details : CVE-2021-32596
A use of one-way hash with a predictable salt vulnerability in the password storing mechanism of FortiPortal 6.0.0 through 6.04 may allow an attacker already in possession of the password store to decrypt the passwords by means of precomputed tables.
Products affected by CVE-2021-32596
- cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-32596
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 21 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-32596
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | |
6.0
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N |
1.5
|
4.0
|
Fortinet, Inc. |
CWE ids for CVE-2021-32596
-
The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-32596
-
https://fortiguard.com/advisory/FG-IR-21-094
FortiPortal - Use of a predictable salt and digest-based algorithm for password hashing | FortiGuardVendor Advisory
Jump to