CVE Vulnerabilities

CVE-2021-41028

Improper Certificate Validation

Published: Dec 16, 2021 | Modified: Jan 04, 2022
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
5.4 MEDIUM
AV:A/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

Name Vendor Start Version End Version
Forticlient Fortinet 6.0.0 (including) 6.0.9 (including)
Forticlient Fortinet 6.2.0 (including) 6.2.9 (including)
Forticlient Fortinet 6.4.0 (including) 6.4.6 (including)
Forticlient Fortinet 7.0.0 (including) 7.0.0 (including)
Forticlient Fortinet 7.0.1 (including) 7.0.1 (including)
Forticlient_endpoint_management_server Fortinet 6.2.0 (including) 6.2.9 (including)
Forticlient_endpoint_management_server Fortinet 6.4.0 (including) 6.4.6 (including)
Forticlient_endpoint_management_server Fortinet 7.0.0 (including) 7.0.0 (including)
Forticlient_endpoint_management_server Fortinet 7.0.1 (including) 7.0.1 (including)

Potential Mitigations

References