Vulnerability Details CVE-2021-41025
Multiple vulnerabilities in the authentication mechanism of confd in FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, 6.1.0 through 6.1.2, 6.0.0 thorugh 6.0.7, including an instance of concurrent execution using shared resource with improper synchronization and one of authentication bypass by capture-replay, may allow a remote unauthenticated attacker to circumvent the authentication process and authenticate as a legitimate cluster peer.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 72.2%
CVSS Severity
CVSS v3 Score 7.3
CVSS v2 Score 7.5
Products affected by CVE-2021-41025
-
cpe:2.3:a:fortinet:fortiweb:6.0.0
-
cpe:2.3:a:fortinet:fortiweb:6.0.1
-
cpe:2.3:a:fortinet:fortiweb:6.0.2
-
cpe:2.3:a:fortinet:fortiweb:6.0.3
-
cpe:2.3:a:fortinet:fortiweb:6.0.4
-
cpe:2.3:a:fortinet:fortiweb:6.0.5
-
cpe:2.3:a:fortinet:fortiweb:6.0.6
-
cpe:2.3:a:fortinet:fortiweb:6.0.7
-
cpe:2.3:a:fortinet:fortiweb:6.1.0
-
cpe:2.3:a:fortinet:fortiweb:6.1.1
-
cpe:2.3:a:fortinet:fortiweb:6.1.2
-
cpe:2.3:a:fortinet:fortiweb:6.2.0
-
cpe:2.3:a:fortinet:fortiweb:6.2.1
-
cpe:2.3:a:fortinet:fortiweb:6.2.2
-
cpe:2.3:a:fortinet:fortiweb:6.2.3
-
cpe:2.3:a:fortinet:fortiweb:6.2.4
-
cpe:2.3:a:fortinet:fortiweb:6.2.5
-
cpe:2.3:a:fortinet:fortiweb:6.2.6
-
cpe:2.3:a:fortinet:fortiweb:6.3.0
-
cpe:2.3:a:fortinet:fortiweb:6.3.1
-
cpe:2.3:a:fortinet:fortiweb:6.3.10
-
cpe:2.3:a:fortinet:fortiweb:6.3.11
-
cpe:2.3:a:fortinet:fortiweb:6.3.12
-
cpe:2.3:a:fortinet:fortiweb:6.3.13
-
cpe:2.3:a:fortinet:fortiweb:6.3.14
-
cpe:2.3:a:fortinet:fortiweb:6.3.15
-
cpe:2.3:a:fortinet:fortiweb:6.3.2
-
cpe:2.3:a:fortinet:fortiweb:6.3.3
-
cpe:2.3:a:fortinet:fortiweb:6.3.4
-
cpe:2.3:a:fortinet:fortiweb:6.3.5
-
cpe:2.3:a:fortinet:fortiweb:6.3.6
-
cpe:2.3:a:fortinet:fortiweb:6.3.7
-
cpe:2.3:a:fortinet:fortiweb:6.3.8
-
cpe:2.3:a:fortinet:fortiweb:6.3.9
-
cpe:2.3:a:fortinet:fortiweb:6.4.0
-
cpe:2.3:a:fortinet:fortiweb:6.4.1
-
cpe:2.3:a:fortinet:fortiweb:6.4.2