CVE-2019-15709

An improper input validation in FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below CLI admin console may allow unauthorized administrators to overwrite system files via specially crafted tcpdump commands in the CLI.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-19-298 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:fortinet:fortiap-s:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiap-s:*:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiap-s:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:fortinet:fortiap-w2:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiap-w2:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiap-w2:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:fortinet:fortiap-u:*:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiap-u:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-06-01 19:15

Updated : 2024-02-04 21:00


NVD link : CVE-2019-15709

Mitre link : CVE-2019-15709

CVE.ORG link : CVE-2019-15709


JSON object : View

Products Affected

fortinet

  • fortiap-u
  • fortiap-s
  • fortiap-w2
CWE
CWE-20

Improper Input Validation