CVE-2021-32598

MEDIUM

Fortinet Fortianalyzer < 7.0.1 - HTTP Request Smuggling

Title source: rule
STIX 2.1

Description

An improper neutralization of CRLF sequences in HTTP headers ('HTTP Response Splitting') vulnerability In FortiManager and FortiAnalyzer GUI 7.0.0, 6.4.6 and below, 6.2.8 and below, 6.0.11 and below, 5.6.11 and below may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response.

Scores

CVSS v3 4.3
EPSS 0.0014
EPSS Percentile 33.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-444
Status published
Products (2)
fortinet/fortianalyzer 5.6.0 - 7.0.1
fortinet/fortimanager 5.6.0 - 7.0.1
Published Aug 05, 2021
Tracked Since Feb 18, 2026