First published: Mon Jun 22 2020(Updated: )
An improper neutralization of input vulnerability in FortiWLC 8.5.1 allows a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the ESS profile or the Radius Profile.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLC | <=8.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9288 has been classified as a medium severity vulnerability due to its potential impact on user session security.
CVE-2020-9288 allows remote authenticated attackers to exploit stored cross-site scripting (XSS) vulnerabilities through unvalidated input in the ESS or Radius Profile.
To mitigate CVE-2020-9288, it is recommended to upgrade FortiWLC to the latest version beyond 8.5.1 where the vulnerability is addressed.
Yes, CVE-2020-9288 can be exploited remotely by authenticated attackers looking to execute stored XSS attacks.
CVE-2020-9288 is specifically associated with stored cross-site scripting attacks that could allow attackers to execute scripts in the context of the user's session.