gsd-2021-42755
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
An integer overflow / wraparound vulnerability [CWE-190] in FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10 and below; FortiOS 7.0.2 and below, 6.4.8 and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0.0, 2.0.6 and below, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 and below, 6.0.10 and below dhcpd daemon may allow an unauthenticated and network adjacent attacker to crash the dhcpd deamon, resulting in potential denial of service.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-42755", "description": "An integer overflow / wraparound vulnerability [CWE-190] in FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10 and below; FortiOS 7.0.2 and below, 6.4.8 and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0.0, 2.0.6 and below, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 and below, 6.0.10 and below dhcpd daemon may allow an unauthenticated and network adjacent attacker to crash the dhcpd deamon, resulting in potential denial of service.", "id": "GSD-2021-42755" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-42755" ], "details": "An integer overflow / wraparound vulnerability [CWE-190] in FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10 and below; FortiOS 7.0.2 and below, 6.4.8 and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0.0, 2.0.6 and below, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 and below, 6.0.10 and below dhcpd daemon may allow an unauthenticated and network adjacent attacker to crash the dhcpd deamon, resulting in potential denial of service.", "id": "GSD-2021-42755", "modified": "2023-12-13T01:23:06.754825Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@fortinet.com", "ID": "CVE-2021-42755", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fortinet FortiSwitch, FortiRecorder, FortiVoiceEnterprise, FortiOS, FortiProxy", "version": { "version_data": [ { "version_value": "FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10\u00a0and below; FortiOS 7.0.2 and below, 6.4.8\u00a0and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0.0, 2.0.6 and below, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 and below, 6.0.10\u00a0and below" } ] } } ] }, "vendor_name": "Fortinet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer overflow / wraparound vulnerability [CWE-190] in FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10 and below; FortiOS 7.0.2 and below, 6.4.8 and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0.0, 2.0.6 and below, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 and below, 6.0.10 and below dhcpd daemon may allow an unauthenticated and network adjacent attacker to crash the dhcpd deamon, resulting in potential denial of service." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Adjacent", "availabilityImpact": "Low", "baseScore": 4.2, "baseSeverity": "Medium", "confidentialityImpact": "None", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "None", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:F/RL:U/RC:C", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/psirt/FG-IR-21-155", "refsource": "CONFIRM", "url": "https://fortiguard.com/psirt/FG-IR-21-155" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "22936F53-4480-4011-9211-174D1C507E87", "versionEndIncluding": "1.0.7", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6BBF05F-4967-4A2E-A8F8-C2086097148B", "versionEndIncluding": "1.1.6", "versionStartIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "33B84D9A-55E3-4146-A55A-ACB507E61B05", "versionEndIncluding": "1.2.13", "versionStartIncluding": "1.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "3902676A-4F5F-4C6A-A22D-DEF5EB4C0543", "versionEndIncluding": "2.0.6", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D909C90B-E136-4E8E-B551-FE0369172C1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "53151CA2-647D-4E40-9247-C0F4E6CB680B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AA5C8467-1765-434E-8C11-65D3139459EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "9D9ECD0B-C46E-485B-AA41-40B9C2A90547", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "EC948E98-B48D-499B-8FD1-4B75754D2B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "668FED55-7378-487E-BE00-C33A45076F02", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "787C3018-40FA-415C-AF4C-D178AC4FB65E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "4F35AB98-B0CD-4B04-992E-087054FCF91F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "91BF8703-2835-4895-A347-74B6E9A2FA30", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "C94723AB-6BBE-4F5E-9560-5ECBE3A809A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "E13ECB66-4AC4-4C1F-92DE-9C8788DD5379", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "640AC3C4-9529-4796-A2B7-E15C9AB520DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "11C09ED8-BEDB-4EAA-B55B-CD8F81FC74CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "4C31FB79-990A-403F-8479-A531837C7A79", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "BBFE82DC-E7BF-440A-A91E-00E5E4613592", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "67411CD4-56F9-4300-BA76-87227EE5CB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "B7AE39C3-77E7-4BF0-AEA7-186A12DDC965", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "C49169A3-E7D2-4A4F-8729-551CCB33452A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "DFC7D4A9-9143-4055-BAA2-E6093B5ED085", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "280D0F29-9BBC-4F39-91D3-C26EBAEEFC4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "47E2D164-490D-40F2-925B-C1DF2D8905F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "17FA9D1F-22C3-4B66-89C9-68EF40D7B128", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.22:*:*:*:*:*:*:*", "matchCriteriaId": "294F7FEE-D8A0-4B6A-ACF4-539F558BAAF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "DE63E91F-43C9-4878-8ABF-43D6FA243B6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "21E72112-DD6F-4F04-B7A6-32F4A3CD652C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.25:*:*:*:*:*:*:*", "matchCriteriaId": "0E46A71A-CC32-4FB9-B291-9D5213F2512B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:5.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "86D2A710-4758-4B86-82C8-D3DDFD082935", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C717350D-43D2-41A4-9AA9-F8EA4F5480CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4FDD21BC-FD00-4CF5-B093-1E6E9DAC9613", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C68C2594-036C-40E0-BAC5-78945229746C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "2917F59F-366B-434E-9CCB-1B734396932A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "D1139A66-DE22-4D31-A17F-E0A7BB4111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "DC8B76AF-0BF0-4283-90B1-48D877CF69A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDC98DF7-9441-4F7B-9B01-36A5F63BD401", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3BA095F4-1B52-40B2-ADFE-19699C2F9E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0BF91792-6CFF-4069-826D-E252CF9CFB84", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "41C9826B-C2E2-4A10-AC6F-CDFDBE837049", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "065C0602-8785-404F-8DD5-EC884F0AC372", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BD90D01-091F-42BC-AC76-45A582873EDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B920B4C-96A2-4341-8F19-8E08A583FEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E9E1371-6C7B-4E98-B34A-9D03C6636CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortivoice:6.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "148EFCE2-1EBA-4673-98D2-86095564B727", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1668AE14-D9A4-4B7D-BC3F-75885792875A", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F3B9B-A06F-4A96-B2E7-9DC56E629182", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "50F8AE97-A647-4A37-8EF2-BC0BBCC8EADD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "377A2F0B-2A58-4C2C-B546-3178B353484B", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "20EBDFD4-45A0-47CC-817E-48E84F945402", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "8C9CDB2B-E454-4B91-9A47-615F31F1A3D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "71148DC5-10A4-48C3-AD65-967F66B6078C", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "6A08987A-D448-4E46-ACB5-DF38CDBDD55B", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C0A35CD0-765F-48BD-A450-E78F213518B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "F8492560-24C1-43B6-A420-068FA9E3C496", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "EE5A3D4C-EF73-4676-A5E3-4008E7AF068D", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "BE267898-AB2B-452E-B219-E0E6885DC5A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6F223989-D906-4B0E-B54B-3D2639745837", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "E1DC5908-9E16-4D12-9F48-AE921ED0D8C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A3BE3F8-9157-461C-8E3A-ABFA728B7DB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C7AEE7B-AB79-462A-BEEF-6EEC558FB8C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADEC69D2-AA57-464C-B59E-585566CCFE34", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "521E94FB-8CB3-486B-A882-49F0ACBAC502", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "F29537A6-456D-41B4-94D6-2FBA9DA3CC2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "82AF3064-9B75-471E-9ADB-F55B64E453BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "BC71169D-0BF3-40BC-8460-A0906B1F21F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "4EC7B4D7-9F3A-43FC-930E-AC55E34A94EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "48B877ED-AF81-42B1-9E88-2CD4831C6D38", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "934A3FB3-97A1-4981-BB15-ABBFD273D79F", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "722B3D73-504E-40EB-B8FB-9F3D9A3B6DB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "CBBDD272-D412-4DF5-A823-76D0C0C036C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "3794902F-7A0C-4EA3-B0E3-959D118ABE47", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "7EE0B7E1-0D61-48C2-ADDB-E009ACBEE084", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:5.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "01048DC4-07BB-4689-A7E8-F0CC4F50718D", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3907C1C9-EAEB-4287-82DA-06F242DEA639", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "52A0DB21-C876-4DD3-95ED-8BA0483F0BD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "20A322D8-C0F0-4F31-81F5-94A12B2B88F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "ABCB90C9-976A-4D85-A84D-A6970E9C11A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "92CA4075-BA53-415E-9348-C4D3F93A683C", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "363F14B5-66AC-4CA2-A11B-E1D70C307C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2BF39DA1-D854-4540-B410-3ECD5A83E95A", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "C552DD33-EAC7-472E-9A1B-4BAF558D7DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "59D90493-FB83-43F0-A576-C90AE7775313", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8E997-3D10-48D2-8FCF-34B8A976A944", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "FA6AF1FA-A034-439A-876B-BFA1BE7DE15E", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "F54D5CC0-D4F4-4F8C-8CD9-A7456ED226F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7EE1-0B07-4B56-A069-AF3B5BBCB79E", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "532A62AB-40C5-4C12-8079-EABCA583DB97", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "64AC05A1-EF48-4282-BB3C-ED60E45CEEBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "72C437B7-75F8-4DDC-9670-19E2C21ACB27", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B468AF9F-1619-4399-A1A5-115C26FB01DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4929DC17-1B20-432D-AEDA-3B3213DC6022", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2625D2C3-A5DE-446A-B551-825B2B24EE92", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "9694FC0C-408A-4892-ADD1-F36F4BBBD9EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "E8C5783F-CE5B-4B8F-AF7C-C182B3ED3EAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "2B8A132F-601F-4129-BFCA-3A976A711D5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "90600B14-07C4-455D-9FC1-17034D91B987", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "953B6278-878B-4B17-8AA2-641A0604F14A", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "4739957D-6605-4F88-AF5F-144598270928", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "AF22D78B-ED8E-42A1-8F0C-F4B52B084B60", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C6E45EB-4C8C-4777-9200-08B14595A3A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D114536-7169-4814-B011-570E3AD86A3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "B28478DA-8D10-4A8E-81EA-D3DF421E5089", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C423AC8-4AA2-426E-8F76-7E5B3CDF82BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "43906627-A03E-42EA-9923-DECBAE34A818", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6E77E34E-9E3F-4022-9969-6DCEDAD1590A", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "C2F935F9-5B6A-47C2-8F65-7A1E8BB061FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:6.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "91C045DF-72E9-4B33-B990-6BA25EDA7209", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "79FEE7F6-F72E-4A43-883C-0CF492DF355B", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBDFDF02-2136-4DE0-A19B-FE3654ED90A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "49D51C9F-CED3-4EA0-89EB-3A63F54B10E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "ADC427FF-F227-401D-8F41-8B3268D577CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "73DADA28-4371-4639-AB3D-BA82F365A337", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "04DB567F-A4D9-483F-83CB-8807EEF6FB07", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "6FBADF2A-2C17-4D37-8315-3B003854AE77", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "EC2673E9-3227-4EAC-9ECD-6576A575F4A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "4742E76F-3030-45F6-A54B-B337D3C6705B", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "056CF29E-1953-4B25-8247-E9A59F511890", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9D9CC045-D163-417F-B8AB-DC07352B81C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "962B9BAB-7414-4E6B-AF5D-F7BB0951229C", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "94283031-0C2F-46B3-BAFE-69900C5DB9CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EA67378-E9BC-4BAE-856D-FEDB42104406", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A4BEB4C-396B-44AB-8E27-357A650A5764", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "53DC5E3E-C08C-4491-9650-0781C4327225", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortirecorder_firmware:6.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "484F6C79-3498-45E3-BF74-CF6075E7D31A", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*", "matchCriteriaId": "843F4434-651D-4A22-80C3-77397E059A98", "versionEndIncluding": "6.0.7", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*", "matchCriteriaId": "549EE910-DAC4-45B7-AE45-6B6A786CD2F5", "versionEndIncluding": "6.2.7", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A13E485-2362-4AC0-9B8E-41998257B31F", "versionEndIncluding": "6.4.9", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*", "matchCriteriaId": "A44AA3D5-FE43-429E-B238-0954D83778A4", "versionEndIncluding": "7.0.2", "versionStartIncluding": "7.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "An integer overflow / wraparound vulnerability [CWE-190] in FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10 and below; FortiOS 7.0.2 and below, 6.4.8 and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0.0, 2.0.6 and below, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 and below, 6.0.10 and below dhcpd daemon may allow an unauthenticated and network adjacent attacker to crash the dhcpd deamon, resulting in potential denial of service." }, { "lang": "es", "value": "Una vulnerabilidad de desbordamiento de enteros / wraparound [CWE-190] en FortiSwitch versiones 7.0.2 y anteriores, 6.4.9 y anteriores, 6.2.x, 6.0.x; FortiRecorder 6.4.2 y anteriores, 6.0.10 y anteriores; FortiOS 7.0.2 y anteriores, 6.4.8 y anteriores, 6.2.10 y anteriores, 6.0.x; FortiProxy 7. 0.0, 2.0.6 y anteriores, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 y anteriores, 6.0.10 y anteriores, dhcpd daemon puede permitir a un atacante no autenticado y adyacente a la red bloquear el dhcpd deamon, resultando en una potencial denegaci\u00f3n de servicio" } ], "id": "CVE-2021-42755", "lastModified": "2024-01-18T15:48:06.043", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "psirt@fortinet.com", "type": "Secondary" } ] }, "published": "2022-07-18T17:15:08.413", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-21-155" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.