CVE-2016-7560

The rsyncd server in Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 has a hardcoded rsync account, which allows remote attackers to read or write to arbitrary files via unspecified vectors.
References
Link Resource
http://fortiguard.com/advisory/FG-IR-16-029 Vendor Advisory
http://www.securityfocus.com/bid/93286 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:7.0-9-1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:7.0-10-0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.0-5-0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.1-2-0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.2-4-0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-10-05 16:59

Updated : 2023-12-10 11:46


NVD link : CVE-2016-7560

Mitre link : CVE-2016-7560

CVE.ORG link : CVE-2016-7560


JSON object : View

Products Affected

fortinet

  • fortiwlc
CWE
CWE-798

Use of Hard-coded Credentials