First published: Thu Mar 30 2017(Updated: )
A read-only administrator on Fortinet devices with FortiOS 5.2.x before 5.2.10 GA and 5.4.x before 5.4.2 GA may have access to read-write administrators password hashes (not including super-admins) stored on the appliance via the webui REST API, and may therefore be able to crack them.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | =5.2.0 | |
Fortinet FortiOS | =5.2.1 | |
Fortinet FortiOS | =5.2.2 | |
Fortinet FortiOS | =5.2.3 | |
Fortinet FortiOS | =5.2.4 | |
Fortinet FortiOS | =5.2.5 | |
Fortinet FortiOS | =5.2.6 | |
Fortinet FortiOS | =5.2.7 | |
Fortinet FortiOS | =5.2.8 | |
Fortinet FortiOS | =5.2.9 | |
Fortinet FortiOS | =5.4.0 | |
Fortinet FortiOS | =5.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7542 is considered to be of medium severity due to its potential to expose sensitive password hashes for non-super-admins.
CVE-2016-7542 affects Fortinet devices running FortiOS versions 5.2.x prior to 5.2.10 and 5.4.x prior to 5.4.2.
To mitigate CVE-2016-7542, upgrade your Fortinet FortiOS to versions 5.2.10 or 5.4.2 or later.
CVE-2016-7542 allows read-only administrators to access read-write administrators' password hashes, potentially enabling them to crack these hashes.
CVE-2016-7542 is not a privilege escalation vulnerability but instead involves improper access control for password hash exposure.