An improper access control (CWE-284) vulnerability in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 and below, version 8.2.7 to 8.2.4, version 8.1.3 may allow an unauthenticated and remote attacker to access certain areas of the web management CGI functionality by just specifying the correct URL. The vulnerability applies only to limited CGI resources and might allow the unauthorized party to access configuration details.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-20-138 |
![]() ![]() |
History
Mon, 17 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 17 Mar 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An improper access control (CWE-284) vulnerability in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 and below, version 8.2.7 to 8.2.4, version 8.1.3 may allow an unauthenticated and remote attacker to access certain areas of the web management CGI functionality by just specifying the correct URL. The vulnerability applies only to limited CGI resources and might allow the unauthorized party to access configuration details. | |
First Time appeared |
Fortinet
Fortinet fortiwlc |
|
Weaknesses | CWE-284 | |
CPEs | cpe:2.3:a:fortinet:fortiwlc:8.1.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.6.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortiwlc |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-03-17T13:37:26.791Z
Reserved: 2021-05-11T21:19:05.180Z
Link: CVE-2021-32584

Updated: 2025-03-17T13:37:22.823Z

Status : Received
Published: 2025-03-17T14:15:17.413
Modified: 2025-03-17T14:15:17.413
Link: CVE-2021-32584

No data.