Vulnerability Details : CVE-2021-42757
A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments.
Vulnerability category: OverflowMemory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2021-42757
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-42757
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
6.7
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.8
|
5.9
|
NIST |
6.7
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.8
|
5.9
|
Fortinet, Inc. |
CWE ids for CVE-2021-42757
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: nvd@nist.gov (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-42757
-
https://fortiguard.com/advisory/FG-IR-21-173
PSIRT Advisories | FortiGuardVendor Advisory
Products affected by CVE-2021-42757
- cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
- cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
- cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
- cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:*
- cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*
- cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiproxy:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiproxy:7.0.1:*:*:*:*:*:*:*
- Fortinet » Fortirecorder FirmwareVersions from including (>=) 6.4.0 and up to, including, (<=) 6.4.2cpe:2.3:o:fortinet:fortirecorder_firmware:*:*:*:*:*:*:*:*
- Fortinet » Fortirecorder FirmwareVersions from including (>=) 2.6.0 and up to, including, (<=) 6.0.10cpe:2.3:o:fortinet:fortirecorder_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortios-6k7k:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortios-6k7k:6.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortios-6k7k:6.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortindr:*:*:*:*:*:*:*:*