{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T02:36:24.355","vulnerabilities":[{"cve":{"id":"CVE-2021-24008","sourceIdentifier":"psirt@fortinet.com","published":"2025-03-28T11:15:36.620","lastModified":"2025-07-24T19:57:26.330","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiDDoS version 5.4.0, version 5.3.2 and below, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, version 4.6.0, version 4.5.0, version 4.4.2 and below, FortiDDoS-CM version 5.3.0, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, FortiVoice version 6.0.6 and below, FortiRecorder version 6.0.3 and below and FortiMail version 6.4.1 and below, version 6.2.4 and below, version 6.0.9 and below may allow a remote, unauthenticated attacker to obtain potentially sensitive software-version information by reading a JavaScript file."},{"lang":"es","value":"Una exposición de información sensible del sistema a una vulnerabilidad de esfera de control no autorizada [CWE-497] en FortiDDoS versión 5.4.0, versión 5.3.2 y anteriores, versión 5.2.0, versión 5.1.0, versión 5.0.0, versión 4.7.0, versión 4.6.0, versión 4.5.0, versión 4.4.2 y anteriores, FortiDDoS-CM versión 5.3.0, versión 5.2.0, versión 5.1.0, versión 5.0.0, versión 4.7.0, FortiVoice versión 6.0.6 y anteriores, FortiRecorder versión 6.0.3 y anteriores y FortiMail versión 6.4.1 y anteriores, versión 6.2.4 y anteriores, versión 6.0.9 y anteriores puede permitir que un atacante remoto no autenticado obtenga información potencialmente sensible de la versión del software leyendo un archivo JavaScript."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.0.10","matchCriteriaId":"1F99B304-8B86-424C-8548-7DD5A0A901E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.0","versionEndExcluding":"6.2.5","matchCriteriaId":"C6896BC5-4B25-45DC-B3C5-8BB80E7C0694"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndExcluding":"6.4.2","matchCriteriaId":"747A8704-F9ED-4710-9B89-C11E49EA7484"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiddos:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.0","versionEndExcluding":"5.4.3","matchCriteriaId":"E0DAD000-EF92-4833-9360-4E93D3597360"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.0.7","matchCriteriaId":"B6B81F4B-C56A-433B-B9AA-35E35031D711"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.0.4","matchCriteriaId":"C0899107-6CAD-40E6-827D-15A73CDB3953"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiddos-cm:4.7.0:*:*:*:*:*:*:*","matchCriteriaId":"9137E599-E5EE-4A4E-ADCE-02842FC5C2FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiddos-cm:5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"ABBCB00D-8C50-414E-8918-258EF062515D"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiddos-cm:5.1.0:*:*:*:*:*:*:*","matchCriteriaId":"82CCAFC5-D480-430A-902C-8B92D20AC09D"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiddos-cm:5.2.0:*:*:*:*:*:*:*","matchCriteriaId":"D9301AAD-CDDE-4480-97A9-0C1EFF2EB31F"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiddos-cm:5.3.0:*:*:*:*:*:*:*","matchCriteriaId":"01A0FC0C-A37F-450E-82F3-9B0C4C4752B6"}]}]}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-20-105","source":"psirt@fortinet.com","tags":["Vendor Advisory"]}]}}]}