Vulnerabilites related to Fortinet - Fortinet FortiWLC
cve-2021-42758
Vulnerability from cvelistv5
Published
2021-12-08 10:53
Modified
2024-10-25 13:42
Severity ?
EPSS score ?
Summary
An improper access control vulnerability [CWE-284] in FortiWLC 8.6.1 and below may allow an authenticated and remote attacker with low privileges to execute any command as an admin user with full access rights via bypassing the GUI restrictions.
References
▼ | URL | Tags |
---|---|---|
https://fortiguard.com/advisory/FG-IR-21-200 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortinet | Fortinet FortiWLC |
Version: FortiWLC 8.6.1 and below |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T03:38:50.213Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://fortiguard.com/advisory/FG-IR-21-200", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-42758", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T14:13:15.441432Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T13:42:26.199Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Fortinet FortiWLC", vendor: "Fortinet", versions: [ { status: "affected", version: "FortiWLC 8.6.1 and below", }, ], }, ], descriptions: [ { lang: "en", value: "An improper access control vulnerability [CWE-284] in FortiWLC 8.6.1 and below may allow an authenticated and remote attacker with low privileges to execute any command as an admin user with full access rights via bypassing the GUI restrictions.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitCodeMaturity: "PROOF_OF_CONCEPT", integrityImpact: "HIGH", privilegesRequired: "LOW", remediationLevel: "UNAVAILABLE", reportConfidence: "REASONABLE", scope: "UNCHANGED", temporalScore: 8, temporalSeverity: "HIGH", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:R", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { description: "Improper access control", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-08T10:53:03", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://fortiguard.com/advisory/FG-IR-21-200", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@fortinet.com", ID: "CVE-2021-42758", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Fortinet FortiWLC", version: { version_data: [ { version_value: "FortiWLC 8.6.1 and below", }, ], }, }, ], }, vendor_name: "Fortinet", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An improper access control vulnerability [CWE-284] in FortiWLC 8.6.1 and below may allow an authenticated and remote attacker with low privileges to execute any command as an admin user with full access rights via bypassing the GUI restrictions.", }, ], }, impact: { cvss: { attackComplexity: "Low", attackVector: "Network", availabilityImpact: "High", baseScore: 8, baseSeverity: "High", confidentialityImpact: "High", integrityImpact: "High", privilegesRequired: "Low", scope: "Unchanged", userInteraction: "None", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:R", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Improper access control", }, ], }, ], }, references: { reference_data: [ { name: "https://fortiguard.com/advisory/FG-IR-21-200", refsource: "CONFIRM", url: "https://fortiguard.com/advisory/FG-IR-21-200", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2021-42758", datePublished: "2021-12-08T10:53:03", dateReserved: "2021-10-20T00:00:00", dateUpdated: "2024-10-25T13:42:26.199Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-8491
Vulnerability from cvelistv5
Published
2017-02-01 17:00
Modified
2024-10-25 14:41
Severity ?
EPSS score ?
Summary
The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell.
References
▼ | URL | Tags |
---|---|---|
https://fortiguard.com/advisory/FG-IR-16-065 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/94186 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortinet | Fortinet FortiWLC |
Version: 7.0-9-1 Version: 7.0-10-0 Version: 8.1-2-0 Version: 8.1-3-2 Version: 8.2-4-0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:27:39.649Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://fortiguard.com/advisory/FG-IR-16-065", }, { name: "94186", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94186", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2016-8491", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-24T20:11:13.770072Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T14:41:05.797Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Fortinet FortiWLC", vendor: "Fortinet", versions: [ { status: "affected", version: "7.0-9-1", }, { status: "affected", version: "7.0-10-0", }, { status: "affected", version: "8.1-2-0", }, { status: "affected", version: "8.1-3-2", }, { status: "affected", version: "8.2-4-0", }, ], }, ], datePublic: "2016-11-09T00:00:00", descriptions: [ { lang: "en", value: "The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell.", }, ], problemTypes: [ { descriptions: [ { description: "Remote shell access", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-02-02T10:57:01", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://fortiguard.com/advisory/FG-IR-16-065", }, { name: "94186", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94186", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@fortinet.com", ID: "CVE-2016-8491", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Fortinet FortiWLC", version: { version_data: [ { version_value: "7.0-9-1", }, { version_value: "7.0-10-0", }, { version_value: "8.1-2-0", }, { version_value: "8.1-3-2", }, { version_value: "8.2-4-0", }, ], }, }, ], }, vendor_name: "Fortinet", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Remote shell access", }, ], }, ], }, references: { reference_data: [ { name: "https://fortiguard.com/advisory/FG-IR-16-065", refsource: "CONFIRM", url: "https://fortiguard.com/advisory/FG-IR-16-065", }, { name: "94186", refsource: "BID", url: "http://www.securityfocus.com/bid/94186", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2016-8491", datePublished: "2017-02-01T17:00:00", dateReserved: "2016-10-07T00:00:00", dateUpdated: "2024-10-25T14:41:05.797Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-9288
Vulnerability from cvelistv5
Published
2020-06-22 15:14
Modified
2024-10-25 14:01
Severity ?
EPSS score ?
Summary
An improper neutralization of input vulnerability in FortiWLC 8.5.1 allows a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the ESS profile or the Radius Profile.
References
▼ | URL | Tags |
---|---|---|
https://fortiguard.com/advisory/FG-IR-20-016 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortinet | Fortinet FortiWLC |
Version: FortiWLC 8.5.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:26:15.623Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://fortiguard.com/advisory/FG-IR-20-016", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-9288", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T13:59:11.194658Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T14:01:09.947Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Fortinet FortiWLC", vendor: "Fortinet", versions: [ { status: "affected", version: "FortiWLC 8.5.1", }, ], }, ], descriptions: [ { lang: "en", value: "An improper neutralization of input vulnerability in FortiWLC 8.5.1 allows a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the ESS profile or the Radius Profile.", }, ], problemTypes: [ { descriptions: [ { description: "Execute unauthorized code or commands", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-06-22T15:14:43", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://fortiguard.com/advisory/FG-IR-20-016", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@fortinet.com", ID: "CVE-2020-9288", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Fortinet FortiWLC", version: { version_data: [ { version_value: "FortiWLC 8.5.1", }, ], }, }, ], }, vendor_name: "Fortinet", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An improper neutralization of input vulnerability in FortiWLC 8.5.1 allows a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the ESS profile or the Radius Profile.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Execute unauthorized code or commands", }, ], }, ], }, references: { reference_data: [ { name: "https://fortiguard.com/advisory/FG-IR-20-016", refsource: "CONFIRM", url: "https://fortiguard.com/advisory/FG-IR-20-016", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2020-9288", datePublished: "2020-06-22T15:14:43", dateReserved: "2020-02-19T00:00:00", dateUpdated: "2024-10-25T14:01:09.947Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }