An escalation of privilege vulnerability in Fortinet FortiWLC-SD versions 8.2.4 and below allows attacker to gain root access via the CLI command 'copy running-config'.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/97603 | Third Party Advisory VDB Entry |
| https://fortiguard.com/psirt/FG-IR-17-097 | Vendor Advisory |
| http://www.securityfocus.com/bid/97603 | Third Party Advisory VDB Entry |
| https://fortiguard.com/psirt/FG-IR-17-097 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:24
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.securityfocus.com/bid/97603 - Third Party Advisory, VDB Entry | |
| References | () https://fortiguard.com/psirt/FG-IR-17-097 - Vendor Advisory |
Information
Published : 2017-05-27 00:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-3134
Mitre link : CVE-2017-3134
CVE.ORG link : CVE-2017-3134
JSON object : View
Products Affected
fortinet
- fortiwlc-sd
CWE
CWE-20
Improper Input Validation
