Fortinet FortiDDoS CVE-2021-24008: Sensitive Info Exposure via JS File <5.4.0
CVE-2021-24008 Published on March 28, 2025
An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiDDoS version 5.4.0, version 5.3.2 and below, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, version 4.6.0, version 4.5.0, version 4.4.2 and below, FortiDDoS-CM version 5.3.0, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, FortiVoice version 6.0.6 and below, FortiRecorder version 6.0.3 and below and FortiMail version 6.4.1 and below, version 6.2.4 and below, version 6.0.9 and below may allow a remote, unauthenticated attacker to obtain potentially sensitive software-version information by reading a JavaScript file.
Vulnerability Analysis
CVE-2021-24008 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity and availability.
Weakness Type
What is an Information Disclosure Vulnerability?
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CVE-2021-24008 has been classified to as an Information Disclosure vulnerability or weakness.
Products Associated with CVE-2021-24008
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-24008 are published in these products:
Affected Versions
Fortinet FortiDDoS:- Version 5.4.0 is affected.
- Version 5.3.0, <= 5.3.2 is affected.
- Version 5.2.0 is affected.
- Version 5.1.0 is affected.
- Version 5.0.0 is affected.
- Version 4.7.0 is affected.
- Version 4.6.0 is affected.
- Version 4.5.0 is affected.
- Version 4.4.0, <= 4.4.2 is affected.
- Version 1.5.0, <= 1.5.3 is affected.
- Version 1.4.0 is affected.
- Version 1.3.0, <= 1.3.1 is affected.
- Version 1.2.0 is affected.
- Version 1.1.0 is affected.
- Version 5.3.0 is affected.
- Version 5.2.0 is affected.
- Version 5.1.0 is affected.
- Version 5.0.0 is affected.
- Version 4.7.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.