First published: Wed Feb 01 2017(Updated: )
The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLC | =7.0-9-1 | |
Fortinet FortiWLC | =7.0-10-0 | |
Fortinet FortiWLC | =8.1-2-0 | |
Fortinet FortiWLC | =8.1-3-2 | |
Fortinet FortiWLC | =8.2-4-0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8491 is considered critical due to the existence of a hardcoded account that can lead to unauthorized access.
To mitigate CVE-2016-8491, users should upgrade Fortinet FortiWLC to a patched version that removes the hardcoded account.
CVE-2016-8491 affects Fortinet FortiWLC versions 7.0-9-1, 7.0-10-0, 8.1-2-0, 8.1-3-2, and 8.2-4-0.
The risks of CVE-2016-8491 include potential unauthorized read/write access to sensitive information and system control.
There are no specific workarounds for CVE-2016-8491; upgrading to a secure version is the recommended solution.