CVE Vulnerabilities

CVE-2021-41028

Improper Certificate Validation

Published: Dec 16, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
5.4 MEDIUM
AV:A/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

NameVendorStart VersionEnd Version
ForticlientFortinet6.0.0 (including)6.0.9 (including)
ForticlientFortinet6.2.0 (including)6.2.9 (including)
ForticlientFortinet6.4.0 (including)6.4.6 (including)
ForticlientFortinet7.0.0 (including)7.0.0 (including)
ForticlientFortinet7.0.1 (including)7.0.1 (including)
Forticlient_endpoint_management_serverFortinet6.2.0 (including)6.2.9 (including)
Forticlient_endpoint_management_serverFortinet6.4.0 (including)6.4.6 (including)
Forticlient_endpoint_management_serverFortinet7.0.0 (including)7.0.0 (including)
Forticlient_endpoint_management_serverFortinet7.0.1 (including)7.0.1 (including)

Potential Mitigations

References