CVE-2021-42758
Summary
| CVE | CVE-2021-42758 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-12-08 11:15:00 UTC |
| Updated | 2021-12-10 22:18:00 UTC |
| Description | An improper access control vulnerability [CWE-284] in FortiWLC 8.6.1 and below may allow an authenticated and remote attacker with low privileges to execute any command as an admin user with full access rights via bypassing the GUI restrictions. |
Risk And Classification
Problem Types: CWE-863
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Fortinet | Fortiwlc | 8.0.5 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.0.6 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.1.2 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.1.3 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.4.0 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.4.1 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.4.2 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.4.4 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.4.5 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.4.6 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.4.7 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.4.8 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.6.0 | All | All | All |
| Application | Fortinet | Fortiwlc | 8.6.1 | All | All | All |
| Application | Fortinet | Fortiwlc | All | All | All | All |
| Application | Fortinet | Fortiwlc | All | All | All | All |
| Application | Fortinet | Fortiwlc | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| PSIRT Advisories | FortiGuard | CONFIRM | fortiguard.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.