Vulnerability Description
A read-only administrator on Fortinet devices with FortiOS 5.2.x before 5.2.10 GA and 5.4.x before 5.4.2 GA may have access to read-write administrators password hashes (not including super-admins) stored on the appliance via the webui REST API, and may therefore be able to crack them.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortios | 5.2.0 |
Related Weaknesses (CWE)
References
- http://fortiguard.com/advisory/FG-IR-16-050Not Applicable
- http://www.securityfocus.com/bid/94690Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037394
- http://fortiguard.com/advisory/FG-IR-16-050Not Applicable
- http://www.securityfocus.com/bid/94690Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037394
FAQ
What is CVE-2016-7542?
CVE-2016-7542 is a vulnerability with a CVSS score of 4.9 (MEDIUM). A read-only administrator on Fortinet devices with FortiOS 5.2.x before 5.2.10 GA and 5.4.x before 5.4.2 GA may have access to read-write administrators password hashes (not including super-admins) st...
How severe is CVE-2016-7542?
CVE-2016-7542 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-7542?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortios.