The combination of various cryptographic issues in the session management of FortiMail 6.4.0 through 6.4.4 and 6.2.0 through 6.2.6, including the encryption construction of the session cookie, may allow a remote attacker already in possession of a cookie to possibly reveal and alter or forge its content, thereby escalating privileges.
                
            References
                    | Link | Resource | 
|---|---|
| https://fortiguard.com/advisory/FG-IR-21-019 | Vendor Advisory | 
| https://fortiguard.com/advisory/FG-IR-21-019 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 05:55
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 6.5 v3 : 7.5 | 
| References | () https://fortiguard.com/advisory/FG-IR-21-019 - Vendor Advisory | 
08 Aug 2023, 14:22
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | NVD-CWE-noinfo | 
Information
                Published : 2021-07-20 11:15
Updated : 2024-11-21 05:55
NVD link : CVE-2021-26095
Mitre link : CVE-2021-26095
CVE.ORG link : CVE-2021-26095
JSON object : View
Products Affected
                fortinet
- fortimail
CWE
                