CVE-2021-41028
Severity CVSS v4.0:
Pending analysis
Type:
CWE-295
Improper Certificate Validation
Publication date:
16/12/2021
Last modified:
04/01/2022
Description
A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.40
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:* | 6.0.0 (including) | 6.0.9 (including) |
| cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* | 6.0.0 (including) | 6.0.9 (including) |
| cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:* | 6.2.0 (including) | 6.2.9 (including) |
| cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:* | 6.2.0 (including) | 6.2.9 (including) |
| cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* | 6.2.0 (including) | 6.2.9 (including) |
| cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:* | 6.4.0 (including) | 6.4.6 (including) |
| cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:* | 6.4.0 (including) | 6.4.6 (including) |
| cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* | 6.4.0 (including) | 6.4.6 (including) |
| cpe:2.3:a:fortinet:forticlient:7.0.0:*:*:*:*:linux:*:* | ||
| cpe:2.3:a:fortinet:forticlient:7.0.0:*:*:*:*:macos:*:* | ||
| cpe:2.3:a:fortinet:forticlient:7.0.0:*:*:*:*:windows:*:* | ||
| cpe:2.3:a:fortinet:forticlient:7.0.1:*:*:*:*:linux:*:* | ||
| cpe:2.3:a:fortinet:forticlient:7.0.1:*:*:*:*:macos:*:* | ||
| cpe:2.3:a:fortinet:forticlient:7.0.1:*:*:*:*:windows:*:* | ||
| cpe:2.3:a:fortinet:forticlient_endpoint_management_server:*:*:*:*:*:*:*:* | 6.2.0 (including) | 6.2.9 (including) |
To consult the complete list of CPE names with products and versions, see this page



