Fortinet FortiAuthenticator 6.2.0

CPE Details

Fortinet FortiAuthenticator 6.2.0
6.2.0
2021-07-07
11h04 +00:00
2021-07-07
11h41 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:fortinet:fortiauthenticator:6.2.0:*:*:*:*:*:*:*

Informations

Vendor

fortinet

Product

fortiauthenticator

Version

6.2.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-35850 2023-04-11 16h07 +00:00 An improper neutralization of script-related HTML tags in a web page vulnerability [CWE-80] in FortiAuthenticator versions 6.4.0 through 6.4.4, 6.3.0 through 6.3.3, all versions of 6.2 and 6.1 may allow a remote unauthenticated attacker to trigger a reflected cross site scripting (XSS) attack via the "reset-password" page.
6.1
Medium
CVE-2023-26208 2023-03-09 14h55 +00:00 A improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiAuthenticator 6.4.x and before allows a remote unauthenticated attacker to partially exhaust CPU and memory via sending numerous HTTP requests to the login form.
5.3
Medium
CVE-2021-26116 2022-04-06 14h00 +00:00 An improper neutralization of special elements used in an OS command vulnerability in the command line interpreter of FortiAuthenticator before 6.3.1 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
8.8
High
CVE-2021-36177 2022-02-02 09h54 +00:00 An improper access control vulnerability [CWE-284] in FortiAuthenticator HA service 6.3.2 and below, 6.2.x, 6.1.x, 6.0.x may allow an attacker on the same vlan as the HA management interface to make an unauthenticated direct connection to the FAC's database.
4.3
Medium
CVE-2021-43067 2021-12-08 10h22 +00:00 A exposure of sensitive information to an unauthorized actor in Fortinet FortiAuthenticator version 6.4.0, version 6.3.2 and below, version 6.2.1 and below, version 6.1.2 and below, version 6.0.7 to 6.0.1 allows attacker to duplicate a target LDAP user 2 factors authentication token via crafted HTTP requests.
8.3
High
CVE-2021-24005 2021-07-06 08h56 +00:00 Usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator versions before 6.3.0 may allow an attacker with access to the files or the CLI configuration to decrypt the sensitive data, via knowledge of the hard-coded key.
7.5
High