CVE-2016-8491

The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell.
References
Link Resource
https://fortiguard.com/advisory/FG-IR-16-065 Vendor Advisory
http://www.securityfocus.com/bid/94186 Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:h:fortinet:fortiwlc:8.2-4-0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiwlc:7.0-9-1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiwlc:7.0-10-0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiwlc:8.1-2-0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiwlc:8.1-3-2:*:*:*:*:*:*:*

Information

Published : 2017-02-01 09:59

Updated : 2017-02-24 10:47


NVD link : CVE-2016-8491

Mitre link : CVE-2016-8491


JSON object : View

CWE
CWE-798

Use of Hard-coded Credentials

Advertisement

dedicated server usa

Products Affected

fortinet

  • fortiwlc