CVE-2021-32596

A use of one-way hash with a predictable salt vulnerability in the password storing mechanism of FortiPortal 6.0.0 through 6.04 may allow an attacker already in possession of the password store to decrypt the passwords by means of precomputed tables.
References
Link Resource
https://fortiguard.com/advisory/FG-IR-21-094 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*

History

10 Aug 2021, 23:36

Type Values Removed Values Added
CWE CWE-916
CPE cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
References (CONFIRM) https://fortiguard.com/advisory/FG-IR-21-094 - (CONFIRM) https://fortiguard.com/advisory/FG-IR-21-094 - Vendor Advisory

04 Aug 2021, 16:51

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-04 16:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-32596

Mitre link : CVE-2021-32596

CVE.ORG link : CVE-2021-32596


JSON object : View

Products Affected

fortinet

  • fortiportal
CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort