Vulnerability Details CVE-2021-26093
An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 6.5%
CVSS Severity
CVSS v3 Score 7.3
Products affected by CVE-2021-26093
-
cpe:2.3:a:fortinet:fortiwlc:8.0.6
-
cpe:2.3:a:fortinet:fortiwlc:8.1-2-0
-
cpe:2.3:a:fortinet:fortiwlc:8.1-3-0
-
cpe:2.3:a:fortinet:fortiwlc:8.1-3-2
-
cpe:2.3:a:fortinet:fortiwlc:8.1.0
-
cpe:2.3:a:fortinet:fortiwlc:8.1.2
-
cpe:2.3:a:fortinet:fortiwlc:8.1.3
-
cpe:2.3:a:fortinet:fortiwlc:8.2-4-0
-
cpe:2.3:a:fortinet:fortiwlc:8.2.4
-
cpe:2.3:a:fortinet:fortiwlc:8.2.6
-
cpe:2.3:a:fortinet:fortiwlc:8.2.7
-
cpe:2.3:a:fortinet:fortiwlc:8.3.0
-
cpe:2.3:a:fortinet:fortiwlc:8.3.1
-
cpe:2.3:a:fortinet:fortiwlc:8.3.2
-
cpe:2.3:a:fortinet:fortiwlc:8.3.3
-
cpe:2.3:a:fortinet:fortiwlc:8.4.0
-
cpe:2.3:a:fortinet:fortiwlc:8.4.1
-
cpe:2.3:a:fortinet:fortiwlc:8.4.2
-
cpe:2.3:a:fortinet:fortiwlc:8.4.3
-
cpe:2.3:a:fortinet:fortiwlc:8.4.4
-
cpe:2.3:a:fortinet:fortiwlc:8.4.5
-
cpe:2.3:a:fortinet:fortiwlc:8.4.6
-
cpe:2.3:a:fortinet:fortiwlc:8.4.7
-
cpe:2.3:a:fortinet:fortiwlc:8.4.8
-
cpe:2.3:a:fortinet:fortiwlc:8.5.0
-
cpe:2.3:a:fortinet:fortiwlc:8.5.1
-
cpe:2.3:a:fortinet:fortiwlc:8.5.2
-
cpe:2.3:a:fortinet:fortiwlc:8.5.3
-
cpe:2.3:a:fortinet:fortiwlc:8.5.4
-
cpe:2.3:a:fortinet:fortiwlc:8.5.5
-
cpe:2.3:a:fortinet:fortiwlc:8.6.0
-
cpe:2.3:a:fortinet:fortiwlc:8.6.1
-
cpe:2.3:a:fortinet:fortiwlc:8.6.2