Security News > 2021 > July > Fortinet Patches Remote Code Execution Vulnerability in FortiManager, FortiAnalyzer

Fortinet Patches Remote Code Execution Vulnerability in FortiManager, FortiAnalyzer
2021-07-21 08:47

Fortinet on Monday announced the availability of patches for a vulnerability in both FortiManager and FortiAnalyzer that could allow an attacker to execute code with root privileges.

While FortiManager delivers full administration capabilities, FortiAnalyzer provides log management, analytics and reporting capabilities.

Tracked as CVE-2021-32589, the newly addressed vulnerability is a use-after-free bug that affects the fgfmsd daemon in FortiManager and FortiAnalyzer.

Users can enable it on specific hardware models, including 1000D, 1000E, 2000E, 3000D, 3000E, 3000F, 3500E, 3500F, 3700F, and 3900E. Customers are advised to update to FortiManager and FortiAnalyzer versions 5.6.11, 6.0.11, 6.2.8, 6.4.6, and 7.0.1 or later, which include patches for the flaw.

As a workaround, administrators can disable the FortiManager features on the FortiAnalyzer unit, Fortinet says.

"The security of our customers is our first priority. We have issued a patch and mitigations and we are proactively communicating to customers, strongly urging them to immediately update their FortiManager and FortiAnalyzer products. Additionally, we recommend that customers validate their configuration to ensure that no unauthorized changes had been implemented by a malicious third party," Fortinet told SecurityWeek.


News URL

http://feedproxy.google.com/~r/securityweek/~3/XCm1F0FgsUY/fortinet-patches-remote-code-execution-vulnerability-fortimanager-fortianalyzer

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2024-12-19 CVE-2021-32589 Unspecified vulnerability in Fortinet Fortianalyzer, Fortimanager and Fortiportal
A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.
network
low complexity
fortinet
critical
9.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Fortinet 80 20 348 308 92 768