Vulnerability Details CVE-2021-22126
A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 4.1%
CVSS Severity
CVSS v3 Score 6.7
Products affected by CVE-2021-22126
-
cpe:2.3:a:fortinet:fortiwlc:8.2.6
-
cpe:2.3:a:fortinet:fortiwlc:8.2.7
-
cpe:2.3:a:fortinet:fortiwlc:8.3.2
-
cpe:2.3:a:fortinet:fortiwlc:8.3.3
-
cpe:2.3:a:fortinet:fortiwlc:8.4.0
-
cpe:2.3:a:fortinet:fortiwlc:8.4.1
-
cpe:2.3:a:fortinet:fortiwlc:8.4.2
-
cpe:2.3:a:fortinet:fortiwlc:8.4.3
-
cpe:2.3:a:fortinet:fortiwlc:8.4.4
-
cpe:2.3:a:fortinet:fortiwlc:8.4.5
-
cpe:2.3:a:fortinet:fortiwlc:8.4.6
-
cpe:2.3:a:fortinet:fortiwlc:8.4.7
-
cpe:2.3:a:fortinet:fortiwlc:8.4.8
-
cpe:2.3:a:fortinet:fortiwlc:8.5.0
-
cpe:2.3:a:fortinet:fortiwlc:8.5.1
-
cpe:2.3:a:fortinet:fortiwlc:8.5.2