A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.
History

Mon, 17 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 17 Mar 2025 13:30:00 +0000

Type Values Removed Values Added
Description A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.
First Time appeared Fortinet
Fortinet fortiwlc
Weaknesses CWE-284
CPEs cpe:2.3:a:fortinet:fortiwlc:8.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.2.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.5.2:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiwlc
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-03-18T03:55:16.635Z

Reserved: 2021-01-04T20:14:12.302Z

Link: CVE-2021-22126

cve-icon Vulnrichment

Updated: 2025-03-17T13:36:28.155Z

cve-icon NVD

Status : Received

Published: 2025-03-17T14:15:17.067

Modified: 2025-03-17T14:15:17.067

Link: CVE-2021-22126

cve-icon Redhat

No data.