{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T22:06:13.043","vulnerabilities":[{"cve":{"id":"CVE-2021-36173","sourceIdentifier":"psirt@fortinet.com","published":"2021-12-08T19:15:09.787","lastModified":"2024-11-21T06:13:15.267","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A heap-based buffer overflow in the firmware signature verification function of FortiOS versions 7.0.1, 7.0.0, 6.4.0 through 6.4.6, 6.2.0 through 6.2.9, and 6.0.0 through 6.0.13 may allow an attacker to execute arbitrary code via specially crafted installation images."},{"lang":"es","value":"Un desbordamiento de búfer en la región heap de la memoria en la función firmware signature verification de FortiOS versiones 7.0.1, 7.0.0, 6.4.0 hasta 6.4.6, 6.2.0 hasta 6.2.9 y 6.0.0 hasta 6.0.13, puede permitir a un atacante ejecutar código arbitrario por medio de imágenes de instalación especialmente diseñadas"}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.13","matchCriteriaId":"A6EF01D9-50FB-4300-87FB-132649A9AC51"},{"vulnerable":true,"criteria":"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.0","versionEndIncluding":"6.2.9","matchCriteriaId":"C4C0308D-8E52-456B-BFC2-62D4C1E9BDC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndIncluding":"6.4.6","matchCriteriaId":"88D6903E-70D0-4D63-BC68-BA37EE91BCB1"},{"vulnerable":true,"criteria":"cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:*","matchCriteriaId":"79FEE7F6-F72E-4A43-883C-0CF492DF355B"},{"vulnerable":true,"criteria":"cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"FBDFDF02-2136-4DE0-A19B-FE3654ED90A4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate-1100e:-:*:*:*:*:*:*:*","matchCriteriaId":"58F428EE-70C1-440F-B16D-45D44A54FB9D"},{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate-200f:-:*:*:*:*:*:*:*","matchCriteriaId":"A07781B7-E990-4BF2-A828-441D556FF2DC"},{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate-2600f:-:*:*:*:*:*:*:*","matchCriteriaId":"4039DD9E-DAB4-45A4-90A7-50D345038CB9"},{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate-3500f:-:*:*:*:*:*:*:*","matchCriteriaId":"A1FD4947-6A13-4C8D-B22C-96D96ACB2363"},{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate-400e:-:*:*:*:*:*:*:*","matchCriteriaId":"FB3F963E-1CFE-4C7C-B44B-AF100592002E"},{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate-600e:-:*:*:*:*:*:*:*","matchCriteriaId":"F034C1C3-E8D1-4426-BC5E-A6D25E31B497"},{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate_1800f:-:*:*:*:*:*:*:*","matchCriteriaId":"76792D6F-B647-43A8-8A60-17BE35824BF7"},{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate_2200e:-:*:*:*:*:*:*:*","matchCriteriaId":"0B2A9D43-348B-45DB-94F7-825B29141F09"},{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate_3300e:-:*:*:*:*:*:*:*","matchCriteriaId":"0CCCA9CD-2B75-46AF-989C-C300CB53358E"},{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate_3600e:-:*:*:*:*:*:*:*","matchCriteriaId":"5015D2E8-8482-467A-96F4-65CBF0AFAC6E"},{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate_40f:-:*:*:*:*:*:*:*","matchCriteriaId":"96C31DB1-CEBD-4796-9CF1-5D9D000A5A9A"},{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate_60f:-:*:*:*:*:*:*:*","matchCriteriaId":"2D32F0C5-2949-48B6-B9DD-F070DE11C803"},{"vulnerable":false,"criteria":"cpe:2.3:h:fortinet:fortigate_7121f:-:*:*:*:*:*:*:*","matchCriteriaId":"E1663D59-D804-44A4-B768-93BDF60F8DEA"}]}]}],"references":[{"url":"https://fortiguard.com/advisory/FG-IR-21-115","source":"psirt@fortinet.com","tags":["Patch","Vendor Advisory"]},{"url":"https://fortiguard.com/advisory/FG-IR-21-115","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}