An improper access control (CWE-284) vulnerability in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 and below, version 8.2.7 to 8.2.4, version 8.1.3 may allow an unauthenticated and remote attacker to access certain areas of the web management CGI functionality by just specifying the correct URL. The vulnerability applies only to limited CGI resources and might allow the unauthorized party to access configuration details.
History

Mon, 17 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 17 Mar 2025 13:30:00 +0000

Type Values Removed Values Added
Description An improper access control (CWE-284) vulnerability in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 and below, version 8.2.7 to 8.2.4, version 8.1.3 may allow an unauthenticated and remote attacker to access certain areas of the web management CGI functionality by just specifying the correct URL. The vulnerability applies only to limited CGI resources and might allow the unauthorized party to access configuration details.
First Time appeared Fortinet
Fortinet fortiwlc
Weaknesses CWE-284
CPEs cpe:2.3:a:fortinet:fortiwlc:8.1.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.2.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.5.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.5.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.6.0:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiwlc
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-03-17T13:37:26.791Z

Reserved: 2021-05-11T21:19:05.180Z

Link: CVE-2021-32584

cve-icon Vulnrichment

Updated: 2025-03-17T13:37:22.823Z

cve-icon NVD

Status : Received

Published: 2025-03-17T14:15:17.413

Modified: 2025-03-17T14:15:17.413

Link: CVE-2021-32584

cve-icon Redhat

No data.