Fortinet FortiAnalyzer before 5.0.12 and 5.2.x before 5.2.5; FortiSwitch 3.3.x before 3.3.3; FortiCache 3.0.x before 3.0.8; and FortiOS 4.1.x before 4.1.11, 4.2.x before 4.2.16, 4.3.x before 4.3.17 and 5.0.x before 5.0.8 have a hardcoded passphrase for the Fortimanager_Access account, which allows remote attackers to obtain administrative access via an SSH session.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.fortinet.com/post/brief-statement-regarding-issues-found-with-fortios - | |
References | () http://packetstormsecurity.com/files/135225/FortiGate-OS-5.0.7-SSH-Backdoor.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2016/Jan/26 - Exploit | |
References | () http://www.fortiguard.com/advisory/multiple-products-ssh-undocumented-login-vulnerability - | |
References | () http://www.securitytracker.com/id/1034663 - | |
References | () https://twitter.com/esizkur/status/686842135501508608 - | |
References | () https://www.exploit-db.com/exploits/39224/ - Exploit |
Information
Published : 2016-01-15 20:59
Updated : 2024-11-21 02:47
NVD link : CVE-2016-1909
Mitre link : CVE-2016-1909
CVE.ORG link : CVE-2016-1909
JSON object : View
Products Affected
fortinet
- fortios
CWE
CWE-264
Permissions, Privileges, and Access Controls