Vulnerability Description
The diagnosis_control.php page in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to download PCAP files via vectors related to the UserName GET parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortiwan | <= 4.2.4 |
Related Weaknesses (CWE)
References
- http://docs.fortinet.com/uploaded/files/3236/fortiwan-v4.2.5-release-notes.pdfRelease NotesThird Party Advisory
- http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilitiesThird Party Advisory
- http://www.securityfocus.com/bid/92781Third Party AdvisoryVDB Entry
- https://www.kb.cert.org/vuls/id/724487Third Party AdvisoryUS Government Resource
- http://docs.fortinet.com/uploaded/files/3236/fortiwan-v4.2.5-release-notes.pdfRelease NotesThird Party Advisory
- http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilitiesThird Party Advisory
- http://www.securityfocus.com/bid/92781Third Party AdvisoryVDB Entry
- https://www.kb.cert.org/vuls/id/724487Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2016-4966?
CVE-2016-4966 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The diagnosis_control.php page in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to download PCAP files via vectors related to the UserName GET parameter.
How severe is CVE-2016-4966?
CVE-2016-4966 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-4966?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortiwan.