First published: Wed Oct 05 2016(Updated: )
Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 allow administrators to obtain sensitive user credentials by reading the pam.log file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLC | <=6.1-2-29 | |
Fortinet FortiWLC | =7.0-9-1 | |
Fortinet FortiWLC | =7.0-10-0 | |
Fortinet FortiWLC | =8.0-5-0 | |
Fortinet FortiWLC | =8.1-2-0 | |
Fortinet FortiWLC | =8.2-4-0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7561 is classified as a high severity vulnerability due to the potential exposure of sensitive user credentials.
To fix CVE-2016-7561, update your Fortinet FortiWLC to a version that is not vulnerable, specifically versions later than 6.1-2-29 and 7.0-10-0.
CVE-2016-7561 affects Fortinet FortiWLC versions 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0.
CVE-2016-7561 allows attackers to read the pam.log file, potentially exposing sensitive user credentials.
Any organization using the vulnerable versions of Fortinet FortiWLC is at risk of credential exposure due to CVE-2016-7561.