CVE-2016-4573
Summary
| CVE | CVE-2016-4573 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-09-09 14:05:07 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | Fortinet FortiSwitch FSW-108D-POE, FSW-124D, FSW-124D-POE, FSW-224D-POE, FSW-224D-FPOE, FSW-248D-POE, FSW-248D-FPOE, FSW-424D, FSW-424D-POE, FSW-424D-FPOE, FSW-448D, FSW-448D-POE, FSW-448D-FPOE, FSW-524D, FSW-524D-FPOE, FSW-548D, FSW-548D-FPOE, FSW-1024D, FSW-1048D, FSW-3032D, and FSW-R-112D-POE models, when in FortiLink managed mode and upgraded to 3.4.1, might allow remote attackers to bypass authentication and gain administrative access via an empty password for the rest_admin account. |
Risk And Classification
Primary CVSS: v3.0 9.8 CRITICAL from [email protected]
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.076290000 probability, percentile 0.919020000 (date 2026-05-06)
Problem Types: CWE-264 | n/a
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.0 | [email protected] | Primary | 9.8 | CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 2.0 | [email protected] | Primary | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
CVSS v3.0 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Fortinet | Fortiswitch | 3.4.1 | All | All | All |
| Hardware | Fortinet | Fsw-1024d | - | All | All | All |
| Hardware | Fortinet | Fsw-1048d | - | All | All | All |
| Hardware | Fortinet | Fsw-108d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-124d | - | All | All | All |
| Hardware | Fortinet | Fsw-124d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-224d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-224d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-248d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-248d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-3032d | - | All | All | All |
| Hardware | Fortinet | Fsw-424d | - | All | All | All |
| Hardware | Fortinet | Fsw-424d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-424d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-448d | - | All | All | All |
| Hardware | Fortinet | Fsw-448d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-448d-poe | - | All | All | All |
| Hardware | Fortinet | Fsw-524d | - | All | All | All |
| Hardware | Fortinet | Fsw-524d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-548d | - | All | All | All |
| Hardware | Fortinet | Fsw-548d-fpoe | - | All | All | All |
| Hardware | Fortinet | Fsw-r-112d-poe | - | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Fortinet FortiSwitch CVE-2016-4573 Security Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| FortiSwitch rest_admin account exposed under specific conditions | FortiGuard.com | af854a3a-2127-422b-91ae-364da2661108 | fortiguard.com | Vendor Advisory |
| The Missing Link - Advisories - cve-2016-4573 | af854a3a-2127-422b-91ae-364da2661108 | www.themissinglink.com.au | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.