FortiWLM Command Injection Vulnerability

CVE-2023-48782

8.6HIGH

Key Information

Vendor
Fortinet
Status
FortiWLM
Vendor
CVE Published:
13 December 2023

Badges

đź“° News Worthy

What is CVE-2023-48782?

CVE-2023-48782 is a command injection vulnerability discovered in Fortinet's FortiWLM versions 8.6.0 to 8.6.5. FortiWLM is a wireless LAN management solution that enables organizations to manage network infrastructure and provide secure connectivity. The vulnerability arises from improper neutralization of special elements in operating system commands, which could allow attackers to inject malicious code through specially crafted HTTP GET request parameters. If exploited, this vulnerability could significantly compromise the integrity of the affected organization's network management processes and lead to unauthorized control over network operations.

Technical Details

The vulnerability is classified as an OS command injection flaw, allowing attackers to execute unauthorized commands on systems running vulnerable versions of FortiWLM. By manipulating HTTP GET request parameters, an attacker could potentially exploit this weakness without the need for prior authentication. The affected versions include FortiWLM from 8.6.0 through 8.6.5, highlighting a critical security oversight in input validation that permits the injection of arbitrary commands.

Potential Impact of CVE-2023-48782

  1. Unauthorized Code Execution: The most significant risk is the potential for attackers to execute arbitrary code or commands on the affected systems, which can lead to further exploitation and system compromise.

  2. Network Management Disruption: Compromise of FortiWLM could allow attackers to manipulate network management processes, potentially resulting in disruptions of connectivity, unauthorized changes to network configurations, or even network downtime.

  3. Data Breaches and Information Leakage: Exploitation of this vulnerability could facilitate unauthorized access to sensitive organizational data, potentially leading to data breaches and leakage of confidential information, which could have serious regulatory and reputational repercussions.

Affected Version(s)

FortiWLM <= 8.6.5

News Articles

Fortinet urges immediate action: Critical RCE flaw exposes systems

Fortinet has addressed critical vulnerabilities in its Wireless LAN Manager (FortiWLM) that could lead to unauthenticated remote code execution (RCE) and

2 days ago

Refferences

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • First article discovered by Dataconomy

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 News Article(s)
.