
Cloud Vulnerability DB
A community-led vulnerabilities database
A privilege escalation vulnerability identified as CVE-2021-24011 was discovered in FortiNAC versions 8.8.1 and below. The vulnerability was disclosed on May 5, 2021, affecting Fortinet's network access control solution. This security flaw allows an authenticated admin user to escalate their privileges to root level by exploiting sudo privileges (Fortinet Advisory, NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 7.2 (High) by NVD with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H. The attack vector is network-based, requires low attack complexity, high privileges, and no user interaction. The scope is unchanged, with high impact on confidentiality, integrity, and availability (NVD).
If successfully exploited, this vulnerability allows an authenticated administrator to elevate their privileges to root level, potentially gaining complete control over the affected FortiNAC system. This could lead to unauthorized access to sensitive system resources and full system compromise (Fortinet Advisory, NVD).
Fortinet has released patches to address this vulnerability. Organizations are advised to upgrade to FortiNAC version 8.8.2 or above, or FortiNAC version 9.1.0 or above to mitigate this security issue (Fortinet Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."