CVE-2016-4573
Summary
| CVE | CVE-2016-4573 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-09-09 14:05:00 UTC |
| Updated | 2016-11-28 20:19:00 UTC |
| Description | Fortinet FortiSwitch FSW-108D-POE, FSW-124D, FSW-124D-POE, FSW-224D-POE, FSW-224D-FPOE, FSW-248D-POE, FSW-248D-FPOE, FSW-424D, FSW-424D-POE, FSW-424D-FPOE, FSW-448D, FSW-448D-POE, FSW-448D-FPOE, FSW-524D, FSW-524D-FPOE, FSW-548D, FSW-548D-FPOE, FSW-1024D, FSW-1048D, FSW-3032D, and FSW-R-112D-POE models, when in FortiLink managed mode and upgraded to 3.4.1, might allow remote attackers to bypass authentication and gain administrative access via an empty password for the rest_admin account. |
Risk And Classification
Problem Types: CWE-264
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Fortinet | Fortiswitch | 3.4.1 | All | All | All |
| Operating System | Fortinet | Fortiswitch | 3.4.1 | All | All | All |
| Hardware | Fortinet | Fsw-1024d | - | All | All | All |
| Hardware | Fortinet | Fsw-1024d | - | All | All | All |
| Hardware | Fortinet | Fsw-1048d | - | All | All | All |
| Hardware | Fortinet | Fsw-1048d | - | All | All | All |
| Hardware | Fortinet | Fsw-108d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-108d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-124d | - | All | All | All |
| Hardware | Fortinet | Fsw-124d | - | All | All | All |
| Hardware | Fortinet | Fsw-124d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-124d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-224d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-224d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-224d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-224d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-248d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-248d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-248d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-248d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-3032d | - | All | All | All |
| Hardware | Fortinet | Fsw-3032d | - | All | All | All |
| Hardware | Fortinet | Fsw-424d | - | All | All | All |
| Hardware | Fortinet | Fsw-424d | - | All | All | All |
| Hardware | Fortinet | Fsw-424d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-424d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-424d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-424d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-448d | - | All | All | All |
| Hardware | Fortinet | Fsw-448d | - | All | All | All |
| Hardware | Fortinet | Fsw-448d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-448d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-448d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-448d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-524d | - | All | All | All |
| Hardware | Fortinet | Fsw-524d | - | All | All | All |
| Hardware | Fortinet | Fsw-524d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-524d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-548d | - | All | All | All |
| Hardware | Fortinet | Fsw-548d | - | All | All | All |
| Hardware | Fortinet | Fsw-548d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-548d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-r-112d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-r-112d-poe | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| FortiSwitch rest_admin account exposed under specific conditions | FortiGuard.com | CONFIRM | fortiguard.com | Vendor Advisory |
| Fortinet FortiSwitch CVE-2016-4573 Security Bypass Vulnerability | BID | www.securityfocus.com | |
| The Missing Link - Advisories - cve-2016-4573 | MISC | www.themissinglink.com.au | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.