CVE-2021-42758

An improper access control vulnerability [CWE-284] in FortiWLC 8.6.1 and below may allow an authenticated and remote attacker with low privileges to execute any command as an admin user with full access rights via bypassing the GUI restrictions.
References
Link Resource
https://fortiguard.com/advisory/FG-IR-21-200 Patch Vendor Advisory
https://fortiguard.com/advisory/FG-IR-21-200 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.1.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.6.1:*:*:*:*:*:*:*

History

21 Nov 2024, 06:28

Type Values Removed Values Added
References () https://fortiguard.com/advisory/FG-IR-21-200 - Patch, Vendor Advisory () https://fortiguard.com/advisory/FG-IR-21-200 - Patch, Vendor Advisory

Information

Published : 2021-12-08 11:15

Updated : 2024-11-21 06:28


NVD link : CVE-2021-42758

Mitre link : CVE-2021-42758

CVE.ORG link : CVE-2021-42758


JSON object : View

Products Affected

fortinet

  • fortiwlc
CWE
CWE-863

Incorrect Authorization