Show plain JSON{"id": "CVE-2021-43075", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}, {"type": "Secondary", "source": "psirt@fortinet.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2022-03-01T19:15:08.480", "references": [{"url": "https://fortiguard.com/advisory/FG-IR-21-128", "tags": ["Vendor Advisory"], "source": "psirt@fortinet.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.2 and below, version 8.5.2 and below, version 8.4.2 and below, version 8.3.2 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests to the alarm dashboard and controller config handlers."}, {"lang": "es", "value": "Una neutralizaci\u00f3n inapropiada de los elementos especiales usados en un comando os (\"inyecci\u00f3n de comando del sistema operativo\") en Fortinet FortiWLM versiones 8.6.2 y anteriores, versiones 8.5.2 y anteriores, versiones 8.4.2 y anteriores, versiones 8.3.2 y anteriores, permite al atacante ejecutar c\u00f3digo o comandos no autorizados por medio de peticiones HTTP dise\u00f1adas a manejadores del tablero de alarmas y de la configuraci\u00f3n del controlador."}], "lastModified": "2022-03-09T14:52:11.213", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C156442-9A85-45E0-8380-D4B7C6865343", "versionEndIncluding": "8.3.2"}, {"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C20F8E9-D7F3-41A0-AAEF-5F176E85BF1B", "versionEndIncluding": "8.4.2", "versionStartIncluding": "8.4.0"}, {"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1790F20-7DF7-46F4-9FC6-8B074CD0ED4C", "versionEndIncluding": "8.5.2", "versionStartIncluding": "8.5.0"}, {"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9986AB2E-6FFB-4DC1-8DE7-98B66AFD362E", "versionEndExcluding": "8.6.3", "versionStartIncluding": "8.6.0"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@fortinet.com"}