
Cloud Vulnerability DB
A community-led vulnerabilities database
A command injection vulnerability (CVE-2021-43075) was identified in Fortinet FortiWLM affecting versions 8.6.2 and below, 8.5.2 and below, 8.4.2 and below, and 8.3.2 and below. The vulnerability allows attackers to execute unauthorized code or commands through crafted HTTP requests targeting the alarm dashboard and controller config handlers (NVD).
The vulnerability is classified as an Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) with a CVSS v3.1 Base Score of 8.8 (HIGH). The attack vector is network-based (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U) with high impact on confidentiality (C:H), integrity (I:H), and availability (A:H) (NVD).
If successfully exploited, this vulnerability allows attackers to execute unauthorized code or commands on the affected systems, potentially leading to complete system compromise. The high CVSS score indicates severe potential impacts on system confidentiality, integrity, and availability (NVD).
Fortinet has addressed this vulnerability in updated versions of FortiWLM. Users are advised to upgrade to versions newer than 8.6.2, 8.5.2, 8.4.2, and 8.3.2 respectively (Vendor Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."