First published: Thu Dec 19 2024(Updated: )
An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLC | >=8.5.3<8.6.0 | |
Fortinet FortiWLC | >=8.0.6<8.6.3 |
Please upgrade to FortiWLC version 8.6.3 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26093 is classified as a high severity vulnerability due to its potential to crash managed access points.
To mitigate CVE-2021-26093, you should update to FortiWLC version 8.6.3 or later.
CVE-2021-26093 affects users of FortiWLC versions 8.6.0, 8.5.3, and earlier.
CVE-2021-26093 requires local and authenticated access, so it cannot be exploited remotely.
CVE-2021-26093 is an access of uninitialized pointer vulnerability.