First published: Wed Sep 21 2016(Updated: )
Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to obtain sensitive information from (1) a backup of the device configuration via script/cfg_show.php or (2) PCAP files via script/system/tcpdump.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWan | <=4.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4967 is considered a medium severity vulnerability due to the potential for sensitive information disclosure.
To fix CVE-2016-4967, upgrade Fortinet FortiWan to version 4.2.5 or later.
CVE-2016-4967 can expose device configuration backups and PCAP files containing network traffic.
CVE-2016-4967 affects remote authenticated users of Fortinet FortiWan versions prior to 4.2.5.
If using a vulnerable version, it is recommended to update the software immediately to mitigate the risk of information disclosure.