Fortinet Fortiwan vulnerabilities

16 known vulnerabilities affecting fortinet/fortiwan.

Total CVEs
16
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH7MEDIUM6

Vulnerabilities

Page 1 of 1
CVE-2021-26102CRITICALCVSS 9.1≥ 4.4.0, < 4.5.8≥ 4.5.0, ≤ 4.5.7+1 more2024-12-19
CVE-2021-26102 [CRITICAL] CWE-305 CVE-2021-26102: A relative path traversal vulnerability (CWE-23) in FortiWAN version 4.5.7 and below, 4.4 all versio A relative path traversal vulnerability (CWE-23) in FortiWAN version 4.5.7 and below, 4.4 all versions may allow a remote non-authenticated attacker to delete files on the system by sending a crafted POST request. In particular, deleting specific configuration files will reset the Admin password to its default value.
cvelistv5nvd
CVE-2021-26115HIGHCVSS 7.8fixed in 4.5.8≥ 4.5.0, ≤ 4.5.7+6 more2024-12-19
CVE-2021-26115 [HIGH] CWE-78 CVE-2021-26115: An OS command injection (CWE-78) vulnerability in FortiWAN version 4.5.7 and below Command Line Inte An OS command injection (CWE-78) vulnerability in FortiWAN version 4.5.7 and below Command Line Interface may allow a local, authenticated and unprivileged attacker to escalate their privileges to root via executing a specially-crafted command.An OS command injection (CWE-78) vulnerability in FortiWAN Command Line Interface may allow a local, authentic
cvelistv5nvd
CVE-2023-44252HIGHCVSS 8.8v5.1.1v5.1.2+4 more2023-12-13
CVE-2023-44252 [HIGH] CWE-287 CVE-2023-44252: ** UNSUPPORTED WHEN ASSIGNED **An improper authentication vulnerability [CWE-287] in Fortinet FortiW ** UNSUPPORTED WHEN ASSIGNED **An improper authentication vulnerability [CWE-287] in Fortinet FortiWAN version 5.2.0 through 5.2.1 and version 5.1.1 through 5.1.2 may allow an authenticated attacker to escalate his privileges via HTTP or HTTPs requests with crafted JWT token values.
cvelistv5nvd
CVE-2023-44251HIGHCVSS 8.8v5.1.1v5.1.2+4 more2023-12-13
CVE-2023-44251 [HIGH] CWE-22 CVE-2023-44251: ** UNSUPPORTED WHEN ASSIGNED **A improper limitation of a pathname to a restricted directory ('path ** UNSUPPORTED WHEN ASSIGNED **A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability [CWE-22] in Fortinet FortiWAN version 5.2.0 through 5.2.1 and version 5.1.1. through 5.1.2 may allow an authenticated attacker to read and delete arbitrary file of the system via crafted HTTP or HTTPs requests.
cvelistv5nvd
CVE-2022-33869HIGHCVSS 8.8≥ 4.0.0, ≤ 4.0.6≥ 4.5.0, < 4.5.10+18 more2023-02-16
CVE-2022-33869 [HIGH] CWE-78 CVE-2022-33869: An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the m An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the management interface of FortiWAN 4.0.0 through 4.5.9 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
cvelistv5nvd
CVE-2021-26114CRITICALCVSS 9.8≤ 4.5.82022-04-06
CVE-2021-26114 [CRITICAL] CWE-89 CVE-2021-26114: Multiple improper neutralization of special elements used in an SQL command vulnerabilities in Forti Multiple improper neutralization of special elements used in an SQL command vulnerabilities in FortiWAN before 4.5.9 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
nvd
CVE-2021-26112CRITICALCVSS 9.8≤ 4.5.82022-04-06
CVE-2021-26112 [HIGH] CWE-787 CVE-2021-26112: Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the co Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN before 4.5.9 may allow an unauthenticated attacker to potentially corrupt control data in memory and execute arbitrary code via specifically crafted requests.
nvd
CVE-2021-26113HIGHCVSS 7.5fixed in 4.5.92022-04-06
CVE-2021-26113 [MEDIUM] CWE-916 CVE-2021-26113: A use of a one-way hash with a predictable salt vulnerability [CWE-760] in FortiWAN before 4.5.9 may A use of a one-way hash with a predictable salt vulnerability [CWE-760] in FortiWAN before 4.5.9 may allow an attacker who has previously come in possession of the password file to potentially guess passwords therein stored.
nvd
CVE-2021-24009HIGHCVSS 8.8≤ 4.5.82022-04-06
CVE-2021-24009 [HIGH] CWE-78 CVE-2021-24009: Multiple improper neutralization of special elements used in an OS command vulnerabilities (CWE-78) Multiple improper neutralization of special elements used in an OS command vulnerabilities (CWE-78) in the Web GUI of FortiWAN before 4.5.9 may allow an authenticated attacker to execute arbitrary commands on the underlying system's shell via specifically crafted HTTP requests.
nvd
CVE-2021-32593MEDIUMCVSS 6.5≤ 4.5.82022-04-06
CVE-2021-32593 [MEDIUM] CWE-327 CVE-2021-32593: A use of a broken or risky cryptographic algorithm vulnerability [CWE-327] in the Dynamic Tunnel Pro A use of a broken or risky cryptographic algorithm vulnerability [CWE-327] in the Dynamic Tunnel Protocol of FortiWAN before 4.5.9 may allow an unauthenticated remote attacker to decrypt and forge protocol communication messages.
nvd
CVE-2021-32585MEDIUMCVSS 6.1fixed in 4.5.92022-04-06
CVE-2021-32585 [HIGH] CWE-79 CVE-2021-32585: An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiWAN be An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiWAN before 4.5.9 may allow an attacker to perform a stored cross-site scripting attack via specifically crafted HTTP requests.
nvd
CVE-2016-4965HIGHCVSS 8.8≤ 4.2.42016-09-21
CVE-2016-4965 [HIGH] CWE-78 CVE-2016-4965: Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users with access t Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users with access to the nslookup functionality to execute arbitrary commands with root privileges via the graph parameter to diagnosis_control.php.
nvd
CVE-2016-4968MEDIUMCVSS 6.5≤ 4.2.42016-09-21
CVE-2016-4968 [MEDIUM] CWE-200 CVE-2016-4968: The linkreport/tmp/admin_global page in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows The linkreport/tmp/admin_global page in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to discover administrator cookies via a GET request.
nvd
CVE-2016-4966MEDIUMCVSS 6.5≤ 4.2.42016-09-21
CVE-2016-4966 [MEDIUM] CWE-287 CVE-2016-4966: The diagnosis_control.php page in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote The diagnosis_control.php page in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to download PCAP files via vectors related to the UserName GET parameter.
nvd
CVE-2016-4969MEDIUMCVSS 6.1≤ 4.2.42016-09-21
CVE-2016-4969 [MEDIUM] CWE-79 CVE-2016-4969: Cross-site scripting (XSS) vulnerability in Fortinet FortiWan (formerly AscernLink) before 4.2.5 all Cross-site scripting (XSS) vulnerability in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote attackers to inject arbitrary web script or HTML via the IP parameter to script/statistics/getconn.php.
nvd
CVE-2016-4967MEDIUMCVSS 6.5≤ 4.2.42016-09-21
CVE-2016-4967 [MEDIUM] CWE-200 CVE-2016-4967: Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to obtain sen Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to obtain sensitive information from (1) a backup of the device configuration via script/cfg_show.php or (2) PCAP files via script/system/tcpdump.php.
nvd