FortiMail - Improper cryptographic operations in cookie encryption potentially prone to forgery
Fortinet PSIRT Advisories
Fortinet PSIRT Contact:
Website: https://fortiguard.fortinet.com/faq/psirt-contact
FG-IR-21-019
Final
1
1
2021-07-07T00:00:00
Current version
2021-07-07T00:00:00
2021-07-07T00:00:00
The combination of various cryptographic issues in the session management of FortiMail, including the encryption construction of the session cookie, may allow a remote attacker already in possession of a cookie to possibly reveal and alter or forge its content, thereby escalating privileges.
Improper access control
FortiMail 6.4.4 and below. FortiMail 6.2.6 and below.
Upgrade to FortiMail 7.0.0. Upgrade to FortiMail 6.4.5.
Internally discovered and reported by Giuseppe Cocomazzi of the Fortinet PSIRT Team.
FortiMail 6.4.4
FortiMail 6.4.3
FortiMail 6.4.2
FortiMail 6.4.1
FortiMail 6.4.0
FortiMail 6.2.6
FortiMail 6.2.5
FortiMail 6.2.4
FortiMail 6.2.3
FortiMail 6.2.2
FortiMail 6.2.1
FortiMail 6.2.0
FortiMail - Improper cryptographic operations in cookie encryption potentially prone to forgery
CVE-2021-26095
FortiMail-6.4.4
FortiMail-6.4.3
FortiMail-6.4.2
FortiMail-6.4.1
FortiMail-6.4.0
FortiMail-6.2.6
FortiMail-6.2.5
FortiMail-6.2.4
FortiMail-6.2.3
FortiMail-6.2.2
FortiMail-6.2.1
FortiMail-6.2.0
6.9
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
https://fortiguard.fortinet.com/psirt/FG-IR-21-019
FortiMail - Improper cryptographic operations in cookie encryption potentially prone to forgery
Reference>