First published: Thu Dec 19 2024(Updated: )
An OS command injection (CWE-78) vulnerability in FortiWAN version 4.5.7 and below Command Line Interface may allow a local, authenticated and unprivileged attacker to escalate their privileges to root via executing a specially-crafted command.An OS command injection (CWE-78) vulnerability in FortiWAN Command Line Interface may allow a local, authenticated and unprivileged attacker to escalate their privileges to root via executing a specially-crafted command.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWAN | <4.5.7 | |
Fortinet FortiWAN | <4.5.8 |
Please upgrade to FortiWAN version 4.5.8 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26115 has been classified as a high severity vulnerability due to its potential for privilege escalation.
To fix CVE-2021-26115, upgrade FortiWAN to version 4.5.8 or later, which addresses this vulnerability.
CVE-2021-26115 affects FortiWAN versions 4.5.7 and below, specifically targeting local authenticated users.
CVE-2021-26115 is an OS command injection vulnerability, specifically classified under CWE-78.
CVE-2021-26115 requires local access and authenticated privileges for exploitation, thus cannot be exploited remotely.