SB2016100537 - Multiple vulnerabilities in Fortinet, FortiWLC



SB2016100537 - Multiple vulnerabilities in Fortinet, FortiWLC

Published: October 5, 2016 Updated: August 9, 2020

Security Bulletin ID SB2016100537
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 67% Medium 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Use of hard-coded credentials (CVE-ID: CVE-2016-8491)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell.


2) Information disclosure (CVE-ID: CVE-2016-7561)

The vulnerability allows a remote privileged user to execute arbitrary code.

Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 allow administrators to obtain sensitive user credentials by reading the pam.log file.


3) Use of hard-coded credentials (CVE-ID: CVE-2016-7560)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The rsyncd server in Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 has a hardcoded rsync account, which allows remote attackers to read or write to arbitrary files via unspecified vectors.


Remediation

Install update from vendor's website.