An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-21-002 |
![]() ![]() |
History
Tue, 21 Jan 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:* |
Fri, 20 Dec 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Dec 2024 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command. | |
First Time appeared |
Fortinet
Fortinet fortiwlc |
|
Weaknesses | CWE-824 | |
CPEs | cpe:2.3:a:fortinet:fortiwlc:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.1.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.6.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortiwlc |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-12-20T17:41:17.833Z
Reserved: 2021-01-25T14:47:15.093Z
Link: CVE-2021-26093

Updated: 2024-12-20T16:45:59.303Z

Status : Analyzed
Published: 2024-12-19T08:15:14.717
Modified: 2025-01-21T20:44:31.650
Link: CVE-2021-26093

No data.