CVE-2021-24020

A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to tamper with signed URLs by appending further data which allows bypass of signature verification.
References
Link Resource
https://fortiguard.com/advisory/FG-IR-21-027 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-326 CWE-347

12 Jul 2021, 13:53

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CPE cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
CWE CWE-326
References (CONFIRM) https://fortiguard.com/advisory/FG-IR-21-027 - (CONFIRM) https://fortiguard.com/advisory/FG-IR-21-027 - Vendor Advisory

09 Jul 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-09 19:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-24020

Mitre link : CVE-2021-24020

CVE.ORG link : CVE-2021-24020


JSON object : View

Products Affected

fortinet

  • fortimail
CWE
CWE-347

Improper Verification of Cryptographic Signature