QID 376126

Date Published: 2021-12-07

QID 376126: FortiGate FortiManager and FortiAnalyzer OS command injection Vulnerability (CWE-78)

FortiManager provides centralized policy-based provisioning, device configuration, and update management for FortiGate, FortiWiFi, and FortiMail appliances, and FortiClient end-point security agents, plus end-to-end network monitoring and device control.

The vulnerability allows a local user to escalate privileges on the system. The vulnerability exists due to improper input validation in the command line interface. A local user can execute arbitrary shell commands as root via specifically crafted CLI command parameters.

Affected Products:
FortiManager versions 5.6.0, 5.6.1, 5.6.2, 5.6.3, 5.6.4, 5.6.5, 5.6.6, 5.6.7, 5.6.8, 5.6.9, 5.6.10, 5.6.11, 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5
FortiAnalyzer versions 5.6.0, 5.6.1, 5.6.2, 5.6.3, 5.6.4, 5.6.5, 5.6.6, 5.6.7, 5.6.8, 5.6.9, 5.6.10, 5.6.11, 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5

QID Detection Logic(Authenticated):
QID will fire the command get system status and will match the affected version

The vulnerability allows a local user to escalate privileges on the system and execute arbitrary shell commands as root via specifically crafted CLI command parameters.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.9 severity.
  • Solution

    Customers are advised to refer to CVE-2021-26104 for more information.

    Vendor References

    CVEs related to QID 376126

    Software Advisories
    Advisory ID Software Component Link
    CVE-2021-26104 URL Logo www.cybersecurity-help.cz/vdb/SB2021080319