Vulnerability Details CVE-2021-42758
An improper access control vulnerability [CWE-284] in FortiWLC 8.6.1 and below may allow an authenticated and remote attacker with low privileges to execute any command as an admin user with full access rights via bypassing the GUI restrictions.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 64.2%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 9.0
Products affected by CVE-2021-42758
-
cpe:2.3:a:fortinet:fortiwlc:8.0.5
-
cpe:2.3:a:fortinet:fortiwlc:8.0.6
-
cpe:2.3:a:fortinet:fortiwlc:8.1.2
-
cpe:2.3:a:fortinet:fortiwlc:8.1.3
-
cpe:2.3:a:fortinet:fortiwlc:8.2.4
-
cpe:2.3:a:fortinet:fortiwlc:8.2.6
-
cpe:2.3:a:fortinet:fortiwlc:8.2.7
-
cpe:2.3:a:fortinet:fortiwlc:8.3.0
-
cpe:2.3:a:fortinet:fortiwlc:8.3.1
-
cpe:2.3:a:fortinet:fortiwlc:8.3.2
-
cpe:2.3:a:fortinet:fortiwlc:8.3.3
-
cpe:2.3:a:fortinet:fortiwlc:8.4.0
-
cpe:2.3:a:fortinet:fortiwlc:8.4.1
-
cpe:2.3:a:fortinet:fortiwlc:8.4.2
-
cpe:2.3:a:fortinet:fortiwlc:8.4.4
-
cpe:2.3:a:fortinet:fortiwlc:8.4.5
-
cpe:2.3:a:fortinet:fortiwlc:8.4.6
-
cpe:2.3:a:fortinet:fortiwlc:8.4.7
-
cpe:2.3:a:fortinet:fortiwlc:8.4.8
-
cpe:2.3:a:fortinet:fortiwlc:8.5.0
-
cpe:2.3:a:fortinet:fortiwlc:8.5.1
-
cpe:2.3:a:fortinet:fortiwlc:8.5.2
-
cpe:2.3:a:fortinet:fortiwlc:8.5.3
-
cpe:2.3:a:fortinet:fortiwlc:8.5.4
-
cpe:2.3:a:fortinet:fortiwlc:8.5.5
-
cpe:2.3:a:fortinet:fortiwlc:8.6.0
-
cpe:2.3:a:fortinet:fortiwlc:8.6.1