First published: Fri Jan 15 2016(Updated: )
Fortinet FortiAnalyzer before 5.0.12 and 5.2.x before 5.2.5; FortiSwitch 3.3.x before 3.3.3; FortiCache 3.0.x before 3.0.8; and FortiOS 4.1.x before 4.1.11, 4.2.x before 4.2.16, 4.3.x before 4.3.17 and 5.0.x before 5.0.8 have a hardcoded passphrase for the Fortimanager_Access account, which allows remote attackers to obtain administrative access via an SSH session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | <=4.3.16 | |
FortiOS | =5.0 | |
FortiOS | =5.0.0 | |
FortiOS | =5.0.1 | |
FortiOS | =5.0.2 | |
FortiOS | =5.0.3 | |
FortiOS | =5.0.4 | |
FortiOS | =5.0.5 | |
FortiOS | =5.0.6 | |
FortiOS | =5.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1909 is classified as a high severity vulnerability due to the presence of a hardcoded passphrase that compromises system security.
To remediate CVE-2016-1909, upgrade the Fortinet FortiOS, FortiAnalyzer, FortiSwitch, or FortiCache to the latest recommended version that addresses this vulnerability.
CVE-2016-1909 affects multiple versions including FortiOS versions prior to 4.1.11, 4.2.16, 4.3.17, and all versions of 5.0 prior to 5.0.8.
CVE-2016-1909 allows potential unauthorized access to the Fortimanager_Access account, leading to elevated privileges and possible system compromise.
Yes, CVE-2016-1909 is considered widely exploitable due to the nature of the hardcoded passphrase being accessible to attackers.