Fortinet FortiTokenAndroid/FortiTokeniOS/FortiTokenWinApp certificate validation
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.7 | $0-$5k | 0.00 |
A vulnerability classified as critical was found in Fortinet FortiTokenAndroid, FortiTokeniOS and FortiTokenWinApp (the affected version is unknown). This vulnerability affects some unknown processing. The manipulation with an unknown input leads to a weak authentication vulnerability. The CWE definition for the vulnerability is CWE-295. The software does not validate, or incorrectly validates, a certificate. The impact remains unknown. CVE summarizes:
A improper validation of certificate with host mismatch in Fortinet FortiTokenAndroid version 5.0.3 and below, Fortinet FortiTokeniOS version 5.2.0 and below, Fortinet FortiTokenWinApp version 4.0.3 and below allows attacker to retrieve information disclosed via man-in-the-middle attacks.
The weakness was disclosed 07/19/2022. The advisory is shared for download at fortiguard.com. This vulnerability was named CVE-2021-22131 since 01/04/2021. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1587.003.
Upgrading eliminates this vulnerability.
Product
Vendor
Name
CPE 2.3
CPE 2.2
CVSSv3
VulDB Meta Base Score: 5.8VulDB Meta Temp Score: 5.7
VulDB Base Score: 5.6
VulDB Temp Score: 5.4
VulDB Vector: 🔒
VulDB Reliability: 🔍
NVD Base Score: 5.4
NVD Vector: 🔒
CNA Base Score: 6.4
CNA Vector (Fortinet, Inc.): 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: Weak authenticationCWE: CWE-295
ATT&CK: T1587.003
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔒
Upgrade: fortiguard.com
Timeline
01/04/2021 CVE reserved07/19/2022 Advisory disclosed
07/19/2022 VulDB entry created
08/06/2022 VulDB last update
Sources
Vendor: fortinet.comAdvisory: fortiguard.com
Status: Confirmed
CVE: CVE-2021-22131 (🔒)
Entry
Created: 07/19/2022 08:06 AMUpdated: 08/06/2022 08:52 AM
Changes: (21) vulnerability_cvss3_meta_basescore vulnerability_cvss3_meta_tempscore vulnerability_cvss3_nvd_basescore vulnerability_cvss3_nvd_av vulnerability_cvss3_nvd_ac vulnerability_cvss3_nvd_pr vulnerability_cvss3_nvd_ui vulnerability_cvss3_nvd_s vulnerability_cvss3_nvd_c vulnerability_cvss3_nvd_i vulnerability_cvss3_nvd_a source_cve_cna vulnerability_cvss3_cna_basescore vulnerability_cvss3_cna_av vulnerability_cvss3_cna_ac vulnerability_cvss3_cna_pr vulnerability_cvss3_cna_ui vulnerability_cvss3_cna_s vulnerability_cvss3_cna_c vulnerability_cvss3_cna_i vulnerability_cvss3_cna_a
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.