An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiDDoS version 5.4.0, version 5.3.2 and below, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, version 4.6.0, version 4.5.0, version 4.4.2 and below, FortiDDoS-CM version 5.3.0, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, FortiVoice version 6.0.6 and below, FortiRecorder version 6.0.3 and below and FortiMail version 6.4.1 and below, version 6.2.4 and below, version 6.0.9 and below may allow a remote, unauthenticated attacker to obtain potentially sensitive software-version information by reading a JavaScript file.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-20-105 |
|
History
Thu, 24 Jul 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet fortiddos-cm
Fortinet fortimail Fortinet fortirecorder Fortinet fortivoice |
|
| Weaknesses | NVD-CWE-Other | |
| CPEs | cpe:2.3:a:fortinet:fortiddos-cm:4.7.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiddos-cm:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiddos-cm:5.1.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiddos-cm:5.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiddos-cm:5.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiddos:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet fortiddos-cm
Fortinet fortimail Fortinet fortirecorder Fortinet fortivoice |
Fri, 28 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 28 Mar 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiDDoS version 5.4.0, version 5.3.2 and below, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, version 4.6.0, version 4.5.0, version 4.4.2 and below, FortiDDoS-CM version 5.3.0, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, FortiVoice version 6.0.6 and below, FortiRecorder version 6.0.3 and below and FortiMail version 6.4.1 and below, version 6.2.4 and below, version 6.0.9 and below may allow a remote, unauthenticated attacker to obtain potentially sensitive software-version information by reading a JavaScript file. | |
| First Time appeared |
Fortinet
Fortinet fortiddos |
|
| Weaknesses | CWE-200 | |
| CPEs | cpe:2.3:o:fortinet:fortiddos:4.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiddos:4.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiddos:4.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiddos:4.5.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiddos:4.6.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiddos:4.7.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiddos:5.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiddos:5.1.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiddos:5.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiddos:5.3.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiddos:5.3.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiddos:5.3.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiddos:5.4.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortiddos |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published: 2025-03-28T10:13:32.120Z
Updated: 2025-03-28T13:39:11.758Z
Reserved: 2021-01-13T21:23:47.335Z
Link: CVE-2021-24008
Updated: 2025-03-28T13:39:03.302Z
Status : Analyzed
Published: 2025-03-28T11:15:36.620
Modified: 2025-07-24T19:57:26.330
Link: CVE-2021-24008
No data.