Vulnerability Details CVE-2021-32593
A use of a broken or risky cryptographic algorithm vulnerability [CWE-327] in the Dynamic Tunnel Protocol of FortiWAN before 4.5.9 may allow an unauthenticated remote attacker to decrypt and forge protocol communication messages.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 38.3%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 6.4
Products affected by CVE-2021-32593
-
cpe:2.3:a:fortinet:fortiwan:-
-
cpe:2.3:a:fortinet:fortiwan:4.1.1
-
cpe:2.3:a:fortinet:fortiwan:4.1.2
-
cpe:2.3:a:fortinet:fortiwan:4.1.3
-
cpe:2.3:a:fortinet:fortiwan:4.2.1
-
cpe:2.3:a:fortinet:fortiwan:4.2.2
-
cpe:2.3:a:fortinet:fortiwan:4.2.4
-
cpe:2.3:a:fortinet:fortiwan:4.2.5
-
cpe:2.3:a:fortinet:fortiwan:4.2.6
-
cpe:2.3:a:fortinet:fortiwan:4.2.7
-
cpe:2.3:a:fortinet:fortiwan:4.3.0
-
cpe:2.3:a:fortinet:fortiwan:4.3.1
-
cpe:2.3:a:fortinet:fortiwan:4.4.0
-
cpe:2.3:a:fortinet:fortiwan:4.4.1
-
cpe:2.3:a:fortinet:fortiwan:4.5.0
-
cpe:2.3:a:fortinet:fortiwan:4.5.1
-
cpe:2.3:a:fortinet:fortiwan:4.5.2
-
cpe:2.3:a:fortinet:fortiwan:4.5.3
-
cpe:2.3:a:fortinet:fortiwan:4.5.4
-
cpe:2.3:a:fortinet:fortiwan:4.5.5
-
cpe:2.3:a:fortinet:fortiwan:4.5.6
-
cpe:2.3:a:fortinet:fortiwan:4.5.7
-
cpe:2.3:a:fortinet:fortiwan:4.5.8