CVE-2021-41028

Severity CVSS v4.0:
Pending analysis
Type:
CWE-295 Improper Certificate Validation
Publication date:
16/12/2021
Last modified:
04/01/2022

Description

A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:* 6.0.0 (including) 6.0.9 (including)
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* 6.0.0 (including) 6.0.9 (including)
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:* 6.2.0 (including) 6.2.9 (including)
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:* 6.2.0 (including) 6.2.9 (including)
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* 6.2.0 (including) 6.2.9 (including)
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:* 6.4.0 (including) 6.4.6 (including)
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:* 6.4.0 (including) 6.4.6 (including)
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* 6.4.0 (including) 6.4.6 (including)
cpe:2.3:a:fortinet:forticlient:7.0.0:*:*:*:*:linux:*:*
cpe:2.3:a:fortinet:forticlient:7.0.0:*:*:*:*:macos:*:*
cpe:2.3:a:fortinet:forticlient:7.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:fortinet:forticlient:7.0.1:*:*:*:*:linux:*:*
cpe:2.3:a:fortinet:forticlient:7.0.1:*:*:*:*:macos:*:*
cpe:2.3:a:fortinet:forticlient:7.0.1:*:*:*:*:windows:*:*
cpe:2.3:a:fortinet:forticlient_endpoint_management_server:*:*:*:*:*:*:*:* 6.2.0 (including) 6.2.9 (including)


References to Advisories, Solutions, and Tools