A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to tamper with signed URLs by appending further data which allows bypass of signature verification.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-10940 | A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to tamper with signed URLs by appending further data which allows bypass of signature verification. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://fortiguard.com/advisory/FG-IR-21-027 |
|
History
Tue, 24 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T13:57:25.857Z
Reserved: 2021-01-13T00:00:00.000Z
Link: CVE-2021-24020
Updated: 2024-08-03T19:14:10.061Z
Status : Modified
Published: 2021-07-09T19:15:08.197
Modified: 2024-11-21T05:52:13.380
Link: CVE-2021-24020
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD