First published: Sun Mar 15 2020(Updated: )
A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAP | <=6.0.5 | |
Fortinet FortiAP | <=6.0.5 | |
Fortinet FortiAP | =6.2.0 | |
Fortinet FortiAP | =6.2.1 | |
Fortinet FortiAP | <=6.0.0 | |
Fortinet FortiAP | <=6.0.5 | |
Fortinet FortiAP | =6.2.0 | |
Fortinet FortiAP | =6.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15708 is a system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below, and FortiAP-U below 6.0.0 that allows unauthorized administrators to run arbitrary system level commands.
CVE-2019-15708 affects Fortinet Fortiap products including FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below, and FortiAP-U below 6.0.0.
CVE-2019-15708 has a severity level of 6.7 (high).
Unauthorized administrators can exploit CVE-2019-15708 by using specially crafted ifconfig commands to run arbitrary system level commands.
Yes, Fortinet has provided a fix for CVE-2019-15708. It is recommended to update to the latest version of the affected Fortiap products.