Hard-Coded Password Vulnerability in Fortinet Wireless Controllers
CVE-2021-22126

6.5MEDIUM

Key Information:

Vendor
Fortinet
Status
Vendor
CVE Published:
17 March 2025

Summary

The Fortinet Wireless Controllers, specifically FortiWLC versions 8.5.2 and below, 8.4.8 and below, 8.3.3 to 8.3.2, and 8.2.7 to 8.2.6, contain a critical flaw due to hard-coded passwords. This vulnerability enables local, authenticated users to gain root access to the managed Access Points, namely Meru AP and FortiAP-U, bypassing authentication controls. Without changing default credentials, attackers could exploit this weakness to potentially compromise network integrity and sensitive information.

Affected Version(s)

FortiWLC 8.5.0 <= 8.5.2

FortiWLC 8.4.4 <= 8.4.8

FortiWLC 8.4.0 <= 8.4.2

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.