The rsyncd server in Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 has a hardcoded rsync account, which allows remote attackers to read or write to arbitrary files via unspecified vectors.
References
Link | Resource |
---|---|
http://fortiguard.com/advisory/FG-IR-16-029 | Vendor Advisory |
http://www.securityfocus.com/bid/93286 | Third Party Advisory VDB Entry |
http://fortiguard.com/advisory/FG-IR-16-029 | Vendor Advisory |
http://www.securityfocus.com/bid/93286 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://fortiguard.com/advisory/FG-IR-16-029 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/93286 - Third Party Advisory, VDB Entry |
Information
Published : 2016-10-05 16:59
Updated : 2024-11-21 02:58
NVD link : CVE-2016-7560
Mitre link : CVE-2016-7560
CVE.ORG link : CVE-2016-7560
JSON object : View
Products Affected
fortinet
- fortiwlc
CWE
CWE-798
Use of Hard-coded Credentials