{"api_version":"1","generated_at":"2026-05-16T21:24:08+00:00","cve":"CVE-2016-8491","urls":{"html":"https://cve.report/CVE-2016-8491","api":"https://cve.report/api/cve/CVE-2016-8491.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2016-8491","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2016-8491"},"summary":{"title":"CVE-2016-8491","description":"The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell.","state":"PUBLISHED","assigner":"fortinet","published_at":"2017-02-01 17:59:00","updated_at":"2025-04-20 01:37:25"},"problem_types":["CWE-798","Remote shell access"],"metrics":[{"version":"3.0","source":"nvd@nist.gov","type":"Primary","score":"9.1","severity":"CRITICAL","vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","data":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"9.4","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:N","baseScore":9.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"NONE"}}],"references":[{"url":"http://www.securityfocus.com/bid/94186","name":"http://www.securityfocus.com/bid/94186","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"FortiWLC CVE-2016-8491 Hardcoded Account Security Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://fortiguard.com/advisory/FG-IR-16-065","name":"https://fortiguard.com/advisory/FG-IR-16-065","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"FortiWLC Undocumented Hardcoded core Account | FortiGuard.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2016-8491","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8491","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Fortinet","product":"Fortinet FortiWLC","version":"affected 7.0-9-1","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"Fortinet FortiWLC","version":"affected 7.0-10-0","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"Fortinet FortiWLC","version":"affected 8.1-2-0","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"Fortinet FortiWLC","version":"affected 8.1-3-2","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"Fortinet FortiWLC","version":"affected 8.2-4-0","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2016","cve_id":"8491","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"fortinet","cpe5":"fortiwlc","cpe6":"7.0-10-0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"8491","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"fortinet","cpe5":"fortiwlc","cpe6":"7.0-9-1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"8491","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"fortinet","cpe5":"fortiwlc","cpe6":"8.1-2-0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"8491","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"fortinet","cpe5":"fortiwlc","cpe6":"8.1-3-2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"8491","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"fortinet","cpe5":"fortiwlc","cpe6":"8.2-4-0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-06T02:27:39.649Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://fortiguard.com/advisory/FG-IR-16-065"},{"name":"94186","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/94186"}],"title":"CVE Program Container"},{"metrics":[{"other":{"content":{"id":"CVE-2016-8491","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2024-10-24T20:11:13.770072Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2024-10-25T14:41:05.797Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"Fortinet FortiWLC","vendor":"Fortinet","versions":[{"status":"affected","version":"7.0-9-1"},{"status":"affected","version":"7.0-10-0"},{"status":"affected","version":"8.1-2-0"},{"status":"affected","version":"8.1-3-2"},{"status":"affected","version":"8.2-4-0"}]}],"datePublic":"2016-11-09T00:00:00.000Z","descriptions":[{"lang":"en","value":"The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell."}],"problemTypes":[{"descriptions":[{"description":"Remote shell access","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-02-02T10:57:01.000Z","orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://fortiguard.com/advisory/FG-IR-16-065"},{"name":"94186","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/94186"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@fortinet.com","ID":"CVE-2016-8491","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Fortinet FortiWLC","version":{"version_data":[{"version_value":"7.0-9-1"},{"version_value":"7.0-10-0"},{"version_value":"8.1-2-0"},{"version_value":"8.1-3-2"},{"version_value":"8.2-4-0"}]}}]},"vendor_name":"Fortinet"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Remote shell access"}]}]},"references":{"reference_data":[{"name":"https://fortiguard.com/advisory/FG-IR-16-065","refsource":"CONFIRM","url":"https://fortiguard.com/advisory/FG-IR-16-065"},{"name":"94186","refsource":"BID","url":"http://www.securityfocus.com/bid/94186"}]}}}},"cveMetadata":{"assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","assignerShortName":"fortinet","cveId":"CVE-2016-8491","datePublished":"2017-02-01T17:00:00.000Z","dateReserved":"2016-10-07T00:00:00.000Z","dateUpdated":"2024-10-25T14:41:05.797Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2017-02-01 17:59:00","lastModifiedDate":"2025-04-20 01:37:25","problem_types":["CWE-798","Remote shell access"],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:N","baseScore":9.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"NONE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":9.2,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:fortinet:fortiwlc:7.0-9-1:*:*:*:*:*:*:*","matchCriteriaId":"A842B7E0-7B16-4872-B18E-C05F30CD72CB"},{"vulnerable":true,"criteria":"cpe:2.3:h:fortinet:fortiwlc:7.0-10-0:*:*:*:*:*:*:*","matchCriteriaId":"7EBCE7F9-9DA6-40BD-9266-FCF0846B6280"},{"vulnerable":true,"criteria":"cpe:2.3:h:fortinet:fortiwlc:8.1-2-0:*:*:*:*:*:*:*","matchCriteriaId":"41B97F50-3CE8-48F8-B24A-4AA79C255C8F"},{"vulnerable":true,"criteria":"cpe:2.3:h:fortinet:fortiwlc:8.1-3-2:*:*:*:*:*:*:*","matchCriteriaId":"4E60189C-EE4B-4910-BD58-35AB93482F0F"},{"vulnerable":true,"criteria":"cpe:2.3:h:fortinet:fortiwlc:8.2-4-0:*:*:*:*:*:*:*","matchCriteriaId":"CA834964-1568-48B9-9828-32C6109597B1"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2016","CveId":"8491","Ordinal":"1","Title":"CVE-2016-8491","CVE":"CVE-2016-8491","Year":"2016"},"notes":[{"CveYear":"2016","CveId":"8491","Ordinal":"1","NoteData":"The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell.","Type":"Description","Title":"CVE-2016-8491"},{"CveYear":"2016","CveId":"8491","Ordinal":"2","NoteData":"2017-02-01","Type":"Other","Title":"Published"},{"CveYear":"2016","CveId":"8491","Ordinal":"3","NoteData":"2017-02-02","Type":"Other","Title":"Modified"}]}}}