First published: Sat Nov 01 2014(Updated: )
FortiNet FortiADC-E with firmware 3.1.1 before 4.0.5 and Coyote Point Equalizer with firmware 10.2.0a allows remote attackers to obtain access to arbitrary subnets via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Coyote Point Equalizer | =10.2.0a | |
Fortinet Coyote Point Equalizer Firmware | ||
Fortinet Fortiadc Firmware | =3.1.1 | |
Fortinet Fortiadc Firmware | =3.2.0 | |
Fortinet Fortiadc Firmware | =3.2.1 | |
Fortinet Fortiadc Firmware | =4.0.4 | |
Fortinet FortiADC-1000E | ||
Fortinet FortiADC 300E | ||
Fortinet FortiADC 400E | ||
Fortinet FortiADC-600E |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8582 is considered to have a high severity due to the potential for remote attackers to access arbitrary subnets.
To fix CVE-2014-8582, it is recommended to upgrade to the latest firmware version as specified in the advisory.
CVE-2014-8582 affects Fortinet FortiADC-E firmware versions 3.1.1 before 4.0.5 and Coyote Point Equalizer firmware version 10.2.0a.
Yes, CVE-2014-8582 can be exploited remotely, allowing unauthorized access to network resources.
There are no specific workarounds for CVE-2014-8582, so upgrading to a secure firmware version is the best approach.