First published: Mon May 07 2018(Updated: )
The presence of a hardcoded account in Fortinet FortiWLC 7.0.11 and earlier allows attackers to gain unauthorized read/write access via a remote shell.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLC | >=7.0<=7.0.11 | |
Fortinet FortiWLC | >=8.0<=8.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17539 is considered a critical vulnerability due to its potential to allow unauthorized access to sensitive data.
To fix CVE-2017-17539, update Fortinet FortiWLC to version 7.0.12 or later, or to a version 8.3.4 or higher.
CVE-2017-17539 allows attackers to gain unauthorized read/write access via a remote shell.
CVE-2017-17539 affects Fortinet FortiWLC versions 7.0.11 and earlier, as well as versions from 8.0 to 8.3.3.
If you cannot update immediately, it is recommended to restrict access to affected devices and monitor for any suspicious activity.