Vulnerability Details CVE-2019-6696
An improper input validation vulnerability in FortiOS 6.2.1, 6.2.0, 6.0.8 and below until 5.4.0 under admin webUI may allow an attacker to perform an URL redirect attack via a specifically crafted request to the admin initial password change webpage.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 42.1%
CVSS Severity
CVSS v3 Score 6.1
CVSS v2 Score 5.8
Products affected by CVE-2019-6696
-
cpe:2.3:o:fortinet:fortios:5.4.0
-
cpe:2.3:o:fortinet:fortios:5.4.1
-
cpe:2.3:o:fortinet:fortios:5.4.10
-
cpe:2.3:o:fortinet:fortios:5.4.11
-
cpe:2.3:o:fortinet:fortios:5.4.12
-
cpe:2.3:o:fortinet:fortios:5.4.13
-
cpe:2.3:o:fortinet:fortios:5.4.2
-
cpe:2.3:o:fortinet:fortios:5.4.3
-
cpe:2.3:o:fortinet:fortios:5.4.4
-
cpe:2.3:o:fortinet:fortios:5.4.5
-
cpe:2.3:o:fortinet:fortios:5.4.6
-
cpe:2.3:o:fortinet:fortios:5.4.7
-
cpe:2.3:o:fortinet:fortios:5.4.8
-
cpe:2.3:o:fortinet:fortios:5.4.9
-
cpe:2.3:o:fortinet:fortios:5.6.0
-
cpe:2.3:o:fortinet:fortios:5.6.1
-
cpe:2.3:o:fortinet:fortios:5.6.10
-
cpe:2.3:o:fortinet:fortios:5.6.11
-
cpe:2.3:o:fortinet:fortios:5.6.12
-
cpe:2.3:o:fortinet:fortios:5.6.13
-
cpe:2.3:o:fortinet:fortios:5.6.14
-
cpe:2.3:o:fortinet:fortios:5.6.2
-
cpe:2.3:o:fortinet:fortios:5.6.3
-
cpe:2.3:o:fortinet:fortios:5.6.4
-
cpe:2.3:o:fortinet:fortios:5.6.5
-
cpe:2.3:o:fortinet:fortios:5.6.6
-
cpe:2.3:o:fortinet:fortios:5.6.7
-
cpe:2.3:o:fortinet:fortios:5.6.8
-
cpe:2.3:o:fortinet:fortios:5.6.9
-
cpe:2.3:o:fortinet:fortios:6.0.0
-
cpe:2.3:o:fortinet:fortios:6.0.1
-
cpe:2.3:o:fortinet:fortios:6.0.2
-
cpe:2.3:o:fortinet:fortios:6.0.3
-
cpe:2.3:o:fortinet:fortios:6.0.4
-
cpe:2.3:o:fortinet:fortios:6.0.5
-
cpe:2.3:o:fortinet:fortios:6.0.6
-
cpe:2.3:o:fortinet:fortios:6.0.7
-
cpe:2.3:o:fortinet:fortios:6.0.8
-
cpe:2.3:o:fortinet:fortios:6.2.0
-
cpe:2.3:o:fortinet:fortios:6.2.1