CVE-2016-8491

The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell.
References
Link Resource
http://www.securityfocus.com/bid/94186 Third Party Advisory VDB Entry
https://fortiguard.com/advisory/FG-IR-16-065 Vendor Advisory
http://www.securityfocus.com/bid/94186 Third Party Advisory VDB Entry
https://fortiguard.com/advisory/FG-IR-16-065 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:fortinet:fortiwlc:7.0-9-1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiwlc:7.0-10-0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiwlc:8.1-2-0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiwlc:8.1-3-2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiwlc:8.2-4-0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:59

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/94186 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94186 - Third Party Advisory, VDB Entry
References () https://fortiguard.com/advisory/FG-IR-16-065 - Vendor Advisory () https://fortiguard.com/advisory/FG-IR-16-065 - Vendor Advisory

Information

Published : 2017-02-01 17:59

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8491

Mitre link : CVE-2016-8491

CVE.ORG link : CVE-2016-8491


JSON object : View

Products Affected

fortinet

  • fortiwlc
CWE
CWE-798

Use of Hard-coded Credentials