CVE Vulnerabilities

CVE-2021-32589

Use After Free

Published: Dec 19, 2024 | Modified: Jan 31, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

Name Vendor Start Version End Version
Fortianalyzer Fortinet 5.2.4 (including) 5.6.11 (excluding)
Fortianalyzer Fortinet 6.0.0 (including) 6.0.11 (excluding)
Fortianalyzer Fortinet 6.2.0 (including) 6.2.8 (excluding)
Fortianalyzer Fortinet 6.4.0 (including) 6.4.6 (excluding)
Fortianalyzer Fortinet 7.0.0 (including) 7.0.0 (including)
Fortimanager Fortinet 5.0.0 (including) 5.6.11 (excluding)
Fortimanager Fortinet 6.0.0 (including) 6.0.11 (excluding)
Fortimanager Fortinet 6.2.0 (including) 6.2.8 (excluding)
Fortimanager Fortinet 6.4.0 (including) 6.4.6 (excluding)
Fortimanager Fortinet 7.0.0 (including) 7.0.0 (including)
Fortiportal Fortinet 4.0.0 (including) 5.3.7 (excluding)
Fortiportal Fortinet 6.0.0 (including) 6.0.6 (excluding)

Potential Mitigations

References