Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19433 | A use of a broken or risky cryptographic algorithm vulnerability [CWE-327] in the Dynamic Tunnel Protocol of FortiWAN before 4.5.9 may allow an unauthenticated remote attacker to decrypt and forge protocol communication messages. |
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-21-070 |
|
Fri, 25 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T13:33:43.236Z
Reserved: 2021-05-11T00:00:00.000Z
Link: CVE-2021-32593
Updated: 2024-08-03T23:25:30.890Z
Status : Modified
Published: 2022-04-06T10:15:07.983
Modified: 2024-11-21T06:07:20.437
Link: CVE-2021-32593
No data.
OpenCVE Enrichment
No data.
EUVD