FortiWeb Improper Crypto Signature Verification (6.4, 6.3.16-, 6.2-, 6.1-, 6.0-)
CVE-2021-43074 Published on February 16, 2023
An improper verification of cryptographic signature vulnerability [CWE-347] in FortiWeb 6.4 all versions, 6.3.16 and below, 6.2 all versions, 6.1 all versions, 6.0 all versions; FortiOS 7.0.3 and below, 6.4.8 and below, 6.2 all versions, 6.0 all versions; FortiSwitch 7.0.3 and below, 6.4.10 and below, 6.2 all versions, 6.0 all versions; FortiProxy 7.0.1 and below, 2.0.7 and below, 1.2 all versions, 1.1 all versions, 1.0 all versions may allow an attacker to decrypt portions of the administrative session management cookie if able to intercept the latter.
Vulnerability Analysis
CVE-2021-43074 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity and availability.
Weakness Type
Improper Verification of Cryptographic Signature
The software does not verify, or incorrectly verifies, the cryptographic signature for data.
Products Associated with CVE-2021-43074
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-43074 are published in these products:
Affected Versions
Fortinet FortiSwitch:- Version 7.0.0, <= 7.0.3 is affected.
- Version 6.4.0, <= 6.4.10 is affected.
- Version 6.2.0, <= 6.2.7 is affected.
- Version 6.0.0, <= 6.0.7 is affected.
- Version 6.4.0, <= 6.4.2 is affected.
- Version 6.3.0, <= 6.3.16 is affected.
- Version 6.2.0, <= 6.2.7 is affected.
- Version 6.1.0, <= 6.1.3 is affected.
- Version 6.0.0, <= 6.0.8 is affected.
- Version 7.0.0, <= 7.0.1 is affected.
- Version 2.0.0, <= 2.0.7 is affected.
- Version 1.2.0, <= 1.2.13 is affected.
- Version 1.1.0, <= 1.1.6 is affected.
- Version 1.0.0, <= 1.0.7 is affected.
- Version 7.0.0, <= 7.0.3 is affected.
- Version 6.4.0, <= 6.4.8 is affected.
- Version 6.2.0, <= 6.2.12 is affected.
- Version 6.0.0, <= 6.0.16 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.