# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2022-23443 |
863 |
|
|
2022-05-04 |
2022-05-13 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An improper access control in Fortinet FortiSOAR before 7.2.0 allows unauthenticated attackers to access gateway API data via crafted HTTP GET requests. |
2 |
CVE-2021-44167 |
732 |
|
|
2022-05-11 |
2022-05-19 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An incorrect permission assignment for critical resource vulnerability [CWE-732] in FortiClient for Linux version 6.0.8 and below, 6.2.9 and below, 6.4.7 and below, 7.0.2 and below may allow an unauthenticated attacker to access sensitive information in log files and directories via symbolic links. |
3 |
CVE-2021-43205 |
200 |
|
+Info |
2022-04-06 |
2022-04-13 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient for Linux version 7.0.2 and below, 6.4.7 and below and 6.2.9 and below may allow an unauthenticated attacker to access the confighandler webserver via external binaries. |
4 |
CVE-2021-43068 |
287 |
|
Bypass |
2021-12-09 |
2021-12-10 |
5.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
None |
A improper authentication in Fortinet FortiAuthenticator version 6.4.0 allows user to bypass the second factor of authentication via a RADIUS login portal. |
5 |
CVE-2021-43064 |
601 |
|
|
2021-12-08 |
2021-12-09 |
5.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
None |
A url redirection to untrusted site ('open redirect') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to use the device as a proxy and reach external or protected hosts via redirection handlers. |
6 |
CVE-2021-41032 |
|
|
|
2022-05-04 |
2022-07-12 |
5.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
None |
An improper access control vulnerability [CWE-284] in FortiOS versions 6.4.8 and prior and 7.0.3 and prior may allow an authenticated attacker with a restricted user profile to gather sensitive information and modify the SSL-VPN tunnel status of other VDOMs using specific CLI commands. |
7 |
CVE-2021-41028 |
798 |
|
|
2021-12-16 |
2022-01-04 |
5.4 |
None |
Local Network |
Medium |
Not required |
Partial |
Partial |
Partial |
A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol. |
8 |
CVE-2021-41024 |
22 |
|
Dir. Trav. |
2021-12-08 |
2021-12-09 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
A relative path traversal [CWE-23] vulnerabiltiy in FortiOS versions 7.0.0 and 7.0.1 and FortiProxy verison 7.0.0 may allow an unauthenticated, unauthorized attacker to inject path traversal character sequences to disclose sensitive information of the server via the GET request of the login page. |
9 |
CVE-2021-41014 |
400 |
|
|
2021-12-08 |
2021-12-09 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
A uncontrolled resource consumption in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows an unauthenticated attacker to make the httpsd daemon unresponsive via huge HTTP packets |
10 |
CVE-2021-41013 |
863 |
|
|
2021-12-08 |
2021-12-10 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An improper access control vulnerability [CWE-284] in FortiWeb versions 6.4.1 and below and 6.3.15 and below in the Report Browse section of Log & Report may allow an unauthorized and unauthenticated user to access the Log reports via their URLs. |
11 |
CVE-2021-36187 |
400 |
|
DoS |
2021-11-02 |
2021-11-04 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
A uncontrolled resource consumption in Fortinet FortiWeb version 6.4.0, version 6.3.15 and below, 6.2.5 and below allows attacker to cause a denial of service for webserver daemon via crafted HTTP requests |
12 |
CVE-2021-36174 |
770 |
|
DoS |
2021-11-02 |
2021-11-04 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
A memory allocation with excessive size value vulnerability in the license verification function of FortiPortal before 6.0.6 may allow an attacker to perform a denial of service attack via specially crafted license blobs. |
13 |
CVE-2021-36167 |
|
|
Bypass |
2021-12-09 |
2022-07-12 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
An improper authorization vulnerabiltiy [CWE-285] in FortiClient Windows versions 7.0.0 and 6.4.6 and below and 6.2.8 and below may allow an unauthenticated attacker to bypass the webfilter control via modifying the session-id paramater. |
14 |
CVE-2021-32596 |
916 |
|
|
2021-08-04 |
2021-08-10 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
A use of one-way hash with a predictable salt vulnerability in the password storing mechanism of FortiPortal 6.0.0 through 6.04 may allow an attacker already in possession of the password store to decrypt the passwords by means of precomputed tables. |
15 |
CVE-2021-32594 |
434 |
|
|
2021-08-04 |
2021-08-11 |
5.5 |
None |
Remote |
Low |
??? |
None |
Partial |
Partial |
An unrestricted file upload vulnerability in the web interface of FortiPortal 6.0.0 through 6.0.4, 5.3.0 through 5.3.5, 5.2.0 through 5.2.5, and 4.2.2 and earlier may allow a low-privileged user to potentially tamper with the underlying system's files via the upload of specifically crafted files. |
16 |
CVE-2021-26113 |
916 |
|
|
2022-04-06 |
2022-04-13 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
A use of a one-way hash with a predictable salt vulnerability [CWE-760] in FortiWAN before 4.5.9 may allow an attacker who has previously come in possession of the password file to potentially guess passwords therein stored. |
17 |
CVE-2021-26108 |
798 |
|
|
2021-12-08 |
2021-12-09 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
A use of hard-coded cryptographic key vulnerability in the SSLVPN of FortiOS before 7.0.1 may allow an attacker to retrieve the key by reverse engineering. |
18 |
CVE-2021-26103 |
345 |
|
CSRF |
2021-12-08 |
2021-12-09 |
5.1 |
None |
Remote |
High |
Not required |
Partial |
Partial |
Partial |
An insufficient verification of data authenticity vulnerability (CWE-345) in the user interface of FortiProxy verison 2.0.3 and below, 1.2.11 and below and FortiGate verison 7.0.0, 6.4.6 and below, 6.2.9 and below of SSL VPN portal may allow a remote, unauthenticated attacker to conduct a cross-site request forgery (CSRF) attack . Only SSL VPN in web mode or full mode are impacted by this vulnerability. |
19 |
CVE-2021-26100 |
347 |
|
|
2021-07-09 |
2022-07-12 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
A missing cryptographic step in the Identity-Based Encryption service of FortiMail before 7.0.0 may allow an unauthenticated attacker who intercepts the encrypted messages to manipulate them in such a way that makes the tampering and the recovery of the plaintexts possible. |
20 |
CVE-2021-26098 |
330 |
|
|
2021-08-04 |
2021-08-11 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An instance of small space of random values in the RPC API of FortiSandbox before 4.0.0 may allow an attacker in possession of a few information pieces about the state of the device to possibly predict valid session IDs. |
21 |
CVE-2021-26090 |
401 |
|
|
2021-07-12 |
2021-07-13 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
A missing release of memory after its effective lifetime vulnerability in the Webmail of FortiMail 6.4.0 through 6.4.4 and 6.2.0 through 6.2.6 may allow an unauthenticated remote attacker to exhaust available memory via specifically crafted login requests. |
22 |
CVE-2021-26088 |
287 |
|
Bypass |
2021-07-12 |
2021-08-02 |
5.8 |
None |
Local Network |
Low |
Not required |
Partial |
Partial |
Partial |
An improper authentication vulnerability in FSSO Collector version 5.0.295 and below may allow an unauthenticated user to bypass a FSSO firewall policy and access the protected network via sending specifically crafted UDP login notification packets. |
23 |
CVE-2021-24018 |
|
|
Exec Code |
2021-08-04 |
2021-11-16 |
5.8 |
None |
Local Network |
Low |
Not required |
Partial |
Partial |
Partial |
A buffer underwrite vulnerability in the firmware verification routine of FortiOS before 7.0.1 may allow an attacker located in the adjacent network to potentially execute arbitrary code via a specifically crafted firmware image. |
24 |
CVE-2021-24005 |
798 |
|
|
2021-07-06 |
2021-07-08 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator versions before 6.3.0 may allow an attacker with access to the files or the CLI configuration to decrypt the sensitive data, via knowledge of the hard-coded key. |
25 |
CVE-2020-29019 |
787 |
|
Overflow |
2021-01-14 |
2021-01-20 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
A stack-based buffer overflow vulnerability in FortiWeb 6.3.0 through 6.3.7 and version before 6.2.4 may allow a remote, unauthenticated attacker to crash the httpd daemon thread by sending a request with a crafted cookie header. |
26 |
CVE-2020-29013 |
20 |
|
|
2022-04-06 |
2022-04-13 |
5.5 |
None |
Remote |
Low |
??? |
None |
Partial |
Partial |
An improper input validation vulnerability in the sniffer interface of FortiSandbox before 3.2.2 may allow an authenticated attacker to silently halt the sniffer via specifically crafted requests. |
27 |
CVE-2020-29012 |
613 |
|
+Info |
2021-09-08 |
2021-09-14 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An insufficient session expiration vulnerability in FortiSandbox versions 3.2.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain information about other users configured on the device, should the attacker be able to obtain that session ID (via other, hypothetical attacks) |
28 |
CVE-2020-15941 |
22 |
|
Dir. Trav. |
2021-10-06 |
2021-10-14 |
5.5 |
None |
Remote |
Low |
??? |
None |
Partial |
Partial |
A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages. |
29 |
CVE-2020-15933 |
200 |
|
+Info |
2022-01-05 |
2022-01-12 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
A exposure of sensitive information to an unauthorized actor in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below FortiMail versions 6.4.1 and 6.4.0 allows attacker to obtain potentially sensitive software-version information via client-side resources inspection. |
30 |
CVE-2020-9289 |
798 |
|
|
2020-06-16 |
2020-07-24 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Use of a hard-coded cryptographic key to encrypt password data in CLI configuration in FortiManager 6.2.3 and below, FortiAnalyzer 6.2.3 and below may allow an attacker with access to the CLI configuration or the CLI backup file to decrypt the sensitive data, via knowledge of the hard-coded key. |
31 |
CVE-2019-17657 |
400 |
|
DoS |
2020-04-07 |
2020-04-08 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An Uncontrolled Resource Consumption vulnerability in Fortinet FortiSwitch below 3.6.11, 6.0.6 and 6.2.2, FortiAnalyzer below 6.2.3, FortiManager below 6.2.3 and FortiAP-S/W2 below 6.2.2 may allow an attacker to cause admin webUI denial of service (DoS) via handling special crafted HTTP requests/responses in pieces slowly, as demonstrated by Slow HTTP DoS Attacks. |
32 |
CVE-2019-17655 |
312 |
|
|
2020-06-16 |
2021-03-09 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
A cleartext storage in a file or on disk (CWE-313) vulnerability in FortiOS SSL VPN 6.2.0 through 6.2.2, 6.0.9 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an attacker to retrieve a logged-in SSL VPN user's credentials should that attacker be able to read the session file stored on the targeted device's system. |
33 |
CVE-2019-16150 |
798 |
|
|
2020-06-04 |
2020-06-09 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Use of a hard-coded cryptographic key to encrypt security sensitive data in local storage and configuration in FortiClient for Windows prior to 6.4.0 may allow an attacker with access to the local storage or the configuration backup file to decrypt the sensitive data via knowledge of the hard-coded key. |
34 |
CVE-2019-15705 |
20 |
|
|
2019-11-27 |
2019-12-16 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An Improper Input Validation vulnerability in the SSL VPN portal of FortiOS versions 6.2.1 and below, and 6.0.6 and below may allow an unauthenticated remote attacker to crash the SSL VPN service by sending a crafted POST request. |
35 |
CVE-2019-6696 |
601 |
|
|
2020-03-15 |
2021-07-21 |
5.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
None |
An improper input validation vulnerability in FortiOS 6.2.1, 6.2.0, 6.0.8 and below until 5.4.0 under admin webUI may allow an attacker to perform an URL redirect attack via a specifically crafted request to the admin initial password change webpage. |
36 |
CVE-2018-13384 |
601 |
|
|
2019-06-04 |
2019-06-05 |
5.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
None |
A Host Header Redirection vulnerability in Fortinet FortiOS all versions below 6.0.5 under SSL VPN web portal allows a remote attacker to potentially poison HTTP cache and subsequently redirect SSL VPN web portal users to arbitrary web domains. |
37 |
CVE-2018-13382 |
285 |
|
|
2019-06-04 |
2021-06-03 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests |
38 |
CVE-2018-13381 |
119 |
|
Overflow |
2019-06-04 |
2021-03-16 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
A buffer overflow vulnerability in Fortinet FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.7, 5.4 and earlier versions and FortiProxy 2.0.0, 1.2.8 and earlier versions under SSL VPN web portal allows a non-authenticated attacker to perform a Denial-of-service attack via special craft message payloads. |
39 |
CVE-2018-13379 |
22 |
|
Dir. Trav. |
2019-06-04 |
2021-06-03 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests. |
40 |
CVE-2018-13376 |
|
|
|
2018-11-27 |
2019-10-03 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An uninitialized memory buffer leak exists in Fortinet FortiOS 5.6.1 to 5.6.3, 5.4.6 to 5.4.7, 5.2 all versions under web proxy's disclaimer response web pages, potentially causing sensitive data to be displayed in the HTTP response. |
41 |
CVE-2018-13367 |
200 |
|
+Info |
2019-08-23 |
2020-06-03 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An information exposure vulnerability in FortiOS 6.2.3, 6.2.0 and below may allow an unauthenticated attacker to gain platform information such as version, models, via parsing a JavaScript file through admin webUI. |
42 |
CVE-2018-13366 |
200 |
|
+Info |
2019-04-09 |
2019-04-10 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An information disclosure vulnerability in Fortinet FortiOS 6.0.1, 5.6.7 and below allows attacker to reveals serial number of FortiGate via hostname field defined in connection control setup packets of PPTP protocol. |
43 |
CVE-2018-13365 |
200 |
|
+Info |
2019-05-29 |
2019-05-30 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An Information Exposure vulnerability in Fortinet FortiOS 6.0.1, 5.6.5 and below, allow attackers to learn private IP as well as the hostname of FortiGate via Application Control Block page. |
44 |
CVE-2018-1355 |
601 |
|
|
2018-06-27 |
2019-03-08 |
5.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
None |
An open redirect vulnerability in Fortinet FortiManager 6.0.0, 5.6.5 and below versions, FortiAnalyzer 6.0.0, 5.6.5 and below versions allows attacker to inject script code during converting a HTML table to a PDF document under the FortiView feature. An attacker may be able to social engineer an authenticated user into generating a PDF file containing injected malicious URLs. |
45 |
CVE-2017-17543 |
326 |
|
|
2018-04-26 |
2020-05-11 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Users' VPN authentication credentials are unsafely encrypted in Fortinet FortiClient for Windows 5.6.0 and below versions, FortiClient for Mac OSX 5.6.0 and below versions and FortiClient SSLVPN Client for Linux 4.4.2335 and below versions, due to the use of a static encryption key and weak encryption algorithms. |
46 |
CVE-2017-14185 |
200 |
|
+Info |
2018-05-25 |
2018-06-27 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An Information Disclosure vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.8 and 5.2 all versions allows SSL VPN web portal users to access internal FortiOS configuration information (eg:addresses) via specifically crafted URLs inside the SSL-VPN web portal. |
47 |
CVE-2017-7731 |
640 |
|
|
2017-05-27 |
2017-05-31 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
A weak password recovery vulnerability in Fortinet FortiPortal versions 4.0.0 and below allows attacker to carry out information disclosure via the Forgotten Password feature. |
48 |
CVE-2017-7343 |
601 |
|
Exec Code |
2017-05-27 |
2017-05-31 |
5.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
None |
An open redirect vulnerability in Fortinet FortiPortal 4.0.0 and below allows attacker to execute unauthorized code or commands via the url parameter. |
49 |
CVE-2017-7338 |
200 |
|
+Info |
2017-05-27 |
2017-05-31 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
A password management vulnerability in Fortinet FortiPortal versions 4.0.0 and below allows an attacker to carry out information disclosure via the FortiAnalyzer Management View. |
50 |
CVE-2017-3130 |
200 |
|
+Info |
2017-08-10 |
2017-08-21 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An information disclosure vulnerability in Fortinet FortiOS 5.6.0, 5.4.4 and below versions allows attacker to get FortiOS version info by inspecting FortiOS IKE VendorID packets. |