Vulnerability Details CVE-2021-44170
A stack-based buffer overflow vulnerability [CWE-121] in the command line interpreter of FortiOS before 7.0.4 and FortiProxy before 2.0.8 may allow an authenticated attacker to execute unauthorized code or commands via specially crafted command line arguments.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 17.7%
CVSS Severity
CVSS v3 Score 6.7
Products affected by CVE-2021-44170
-
cpe:2.3:a:fortinet:fortiproxy:1.0.0
-
cpe:2.3:a:fortinet:fortiproxy:1.0.1
-
cpe:2.3:a:fortinet:fortiproxy:1.0.2
-
cpe:2.3:a:fortinet:fortiproxy:1.0.3
-
cpe:2.3:a:fortinet:fortiproxy:1.0.4
-
cpe:2.3:a:fortinet:fortiproxy:1.0.5
-
cpe:2.3:a:fortinet:fortiproxy:1.0.6
-
cpe:2.3:a:fortinet:fortiproxy:1.0.7
-
cpe:2.3:a:fortinet:fortiproxy:1.1.0
-
cpe:2.3:a:fortinet:fortiproxy:1.1.1
-
cpe:2.3:a:fortinet:fortiproxy:1.1.2
-
cpe:2.3:a:fortinet:fortiproxy:1.1.3
-
cpe:2.3:a:fortinet:fortiproxy:1.1.4
-
cpe:2.3:a:fortinet:fortiproxy:1.1.5
-
cpe:2.3:a:fortinet:fortiproxy:1.1.6
-
cpe:2.3:a:fortinet:fortiproxy:1.2.0
-
cpe:2.3:a:fortinet:fortiproxy:1.2.1
-
cpe:2.3:a:fortinet:fortiproxy:1.2.10
-
cpe:2.3:a:fortinet:fortiproxy:1.2.11
-
cpe:2.3:a:fortinet:fortiproxy:1.2.12
-
cpe:2.3:a:fortinet:fortiproxy:1.2.13
-
cpe:2.3:a:fortinet:fortiproxy:1.2.2
-
cpe:2.3:a:fortinet:fortiproxy:1.2.3
-
cpe:2.3:a:fortinet:fortiproxy:1.2.4
-
cpe:2.3:a:fortinet:fortiproxy:1.2.5
-
cpe:2.3:a:fortinet:fortiproxy:1.2.6
-
cpe:2.3:a:fortinet:fortiproxy:1.2.7
-
cpe:2.3:a:fortinet:fortiproxy:1.2.8
-
cpe:2.3:a:fortinet:fortiproxy:1.2.9
-
cpe:2.3:a:fortinet:fortiproxy:2.0.0
-
cpe:2.3:a:fortinet:fortiproxy:2.0.1
-
cpe:2.3:a:fortinet:fortiproxy:2.0.2
-
cpe:2.3:a:fortinet:fortiproxy:2.0.3
-
cpe:2.3:a:fortinet:fortiproxy:2.0.4
-
cpe:2.3:a:fortinet:fortiproxy:2.0.5
-
cpe:2.3:a:fortinet:fortiproxy:2.0.6
-
cpe:2.3:a:fortinet:fortiproxy:2.0.7
-
cpe:2.3:o:fortinet:fortios:6.0.0
-
cpe:2.3:o:fortinet:fortios:6.0.1
-
cpe:2.3:o:fortinet:fortios:6.0.10
-
cpe:2.3:o:fortinet:fortios:6.0.11
-
cpe:2.3:o:fortinet:fortios:6.0.12
-
cpe:2.3:o:fortinet:fortios:6.0.13
-
cpe:2.3:o:fortinet:fortios:6.0.14
-
cpe:2.3:o:fortinet:fortios:6.0.2
-
cpe:2.3:o:fortinet:fortios:6.0.3
-
cpe:2.3:o:fortinet:fortios:6.0.4
-
cpe:2.3:o:fortinet:fortios:6.0.5
-
cpe:2.3:o:fortinet:fortios:6.0.6
-
cpe:2.3:o:fortinet:fortios:6.0.7
-
cpe:2.3:o:fortinet:fortios:6.0.8
-
cpe:2.3:o:fortinet:fortios:6.0.9
-
cpe:2.3:o:fortinet:fortios:6.2.0
-
cpe:2.3:o:fortinet:fortios:6.2.1
-
cpe:2.3:o:fortinet:fortios:6.2.10
-
cpe:2.3:o:fortinet:fortios:6.2.2
-
cpe:2.3:o:fortinet:fortios:6.2.3
-
cpe:2.3:o:fortinet:fortios:6.2.4
-
cpe:2.3:o:fortinet:fortios:6.2.5
-
cpe:2.3:o:fortinet:fortios:6.2.6
-
cpe:2.3:o:fortinet:fortios:6.2.7
-
cpe:2.3:o:fortinet:fortios:6.2.8
-
cpe:2.3:o:fortinet:fortios:6.2.9
-
cpe:2.3:o:fortinet:fortios:6.4.0
-
cpe:2.3:o:fortinet:fortios:6.4.1
-
cpe:2.3:o:fortinet:fortios:6.4.2
-
cpe:2.3:o:fortinet:fortios:6.4.3
-
cpe:2.3:o:fortinet:fortios:6.4.4
-
cpe:2.3:o:fortinet:fortios:6.4.5
-
cpe:2.3:o:fortinet:fortios:6.4.6
-
cpe:2.3:o:fortinet:fortios:6.4.7
-
cpe:2.3:o:fortinet:fortios:6.4.8
-
cpe:2.3:o:fortinet:fortios:7.0.0
-
cpe:2.3:o:fortinet:fortios:7.0.1
-
cpe:2.3:o:fortinet:fortios:7.0.2