CVE-2021-44168 is a vulnerability in Fortinet Fortios
Published on January 4, 2022
A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3 may allow a local authenticated attacker to download arbitrary files on the device via specially crafted update packages.
Known Exploited Vulnerability
This Fortinet FortiOS Arbitrary File Download vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Fortinet FortiOS "execute restore src-vis" downloads code without integrity checking, allowing an attacker to arbitrarily download files.
The following remediation steps are recommended / required by December 24, 2021: Apply updates per vendor instructions.
Vulnerability Analysis
CVE-2021-44168 is exploitable with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 1.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.
Download of Code Without Integrity Check
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code. An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit.
Products Associated with CVE-2021-44168
You can be notified by stack.watch whenever vulnerabilities like CVE-2021-44168 are published in these products:
What versions of Fortios are vulnerable to CVE-2021-44168?
-
Fortinet Fortios Fixed in Version 6.0.14
-
Fortinet Fortios Version 6.2.0 Fixed in Version 6.2.10
-
Fortinet Fortios Version 6.4.0 Fixed in Version 6.4.8
-
Fortinet Fortios Version 7.0.0 Fixed in Version 7.0.3