Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "4983FD48-A409-4A40-B936-73719B526FDC", "versionEndExcluding": "6.4.6", "versionStartIncluding": "6.4.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "58FFD38C-7193-4118-A0CD-B4D79773F764", "versionEndExcluding": "6.2.6", "versionStartIncluding": "6.2.4", "vulnerable": true}, {"criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "3835833F-7C94-487C-800B-6E20DF263E79", "versionEndExcluding": "6.2.6", "versionStartIncluding": "6.2.4", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An improper neutralization of special elements used in an OS Command vulnerability in FortiAP's console 6.4.1 through 6.4.5 and 6.2.4 through 6.2.5 may allow an authenticated attacker to execute unauthorized commands by running the kdbg CLI command with specifically crafted arguments."}, {"lang": "es", "value": "Una vulnerabilidad neutralizaci\u00f3n inapropiada de los elementos especiales usados en comandos del Sistema Operativo en la consola de FortiAP versiones 6.4.1 hasta 6.4.5 y versiones 6.2.4 hasta 6.2.5, puede permitir a un atacante autenticado ejecutar comandos no autorizados al ejecutar el comando kdbg CLI con argumentos espec\u00edficamente dise\u00f1ados"}], "id": "CVE-2021-26106", "lastModified": "2024-11-21T05:55:52.487", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@fortinet.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-07-09T19:15:08.313", "references": [{"source": "psirt@fortinet.com", "tags": ["Vendor Advisory"], "url": "https://fortiguard.com/advisory/FG-IR-20-210"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://fortiguard.com/advisory/FG-IR-20-210"}], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-78"}], "source": "nvd@nist.gov", "type": "Primary"}]}