First published: Mon Mar 17 2025(Updated: )
An improper access control (CWE-284) vulnerability in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 and below, version 8.2.7 to 8.2.4, version 8.1.3 may allow an unauthenticated and remote attacker to access certain areas of the web management CGI functionality by just specifying the correct URL. The vulnerability applies only to limited CGI resources and might allow the unauthorized party to access configuration details.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLC | <8.5.3<8.4.8<8.3.3>=8.2.4<=8.2.7 |
Please upgrade to FortiWLC version 8.5.4 or above. Please upgrade to FortiWLC version 8.6.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32584 is classified as a critical severity vulnerability due to improper access control allowing unauthenticated remote access.
To fix CVE-2021-32584, Fortinet recommends upgrading to FortiWLC version 8.6.1 or the latest version available.
CVE-2021-32584 affects FortiWLC versions 8.5.3 and below, 8.4.8 and below, 8.3.3 and below, and specific ranges in 8.2.x.
Yes, CVE-2021-32584 can be exploited by an unauthenticated remote attacker.
Exploitation of CVE-2021-32584 may allow attackers to gain unauthorized access to sensitive areas of the web management interface.