CVE-2019-15709
 
Severity Score
6.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
An improper input validation in FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below CLI admin console may allow unauthorized administrators to overwrite system files via specially crafted tcpdump commands in the CLI.
Una comprobación de entrada inapropiada en FortiAP-S/W2 versiones 6.2.0 hasta 6.2.2, versiones 6.0.5 y por debajo, FortiAP-U versiones 6.0.1 y por debajo, la consola de administración de la CLI puede permitir a administradores no autorizados sobrescribir los archivos de sistema por medio comandos tcpdump especialmente diseñados en la CLI.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2019-08-27 CVE Reserved
- 2020-06-01 CVE Published
- 2023-09-03 EPSS Updated
- 2024-10-25 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://fortiguard.com/psirt/FG-IR-19-298 | 2020-06-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fortinet Search vendor "Fortinet" | Fortiap-s Search vendor "Fortinet" for product "Fortiap-s" | <= 6.0.5 Search vendor "Fortinet" for product "Fortiap-s" and version " <= 6.0.5" | - |
Affected
| in | Fortinet Search vendor "Fortinet" | Fortiap-s Search vendor "Fortinet" for product "Fortiap-s" | - | - |
Safe
|
Fortinet Search vendor "Fortinet" | Fortiap-s Search vendor "Fortinet" for product "Fortiap-s" | >= 6.2.0 <= 6.2.2 Search vendor "Fortinet" for product "Fortiap-s" and version " >= 6.2.0 <= 6.2.2" | - |
Affected
| in | Fortinet Search vendor "Fortinet" | Fortiap-s Search vendor "Fortinet" for product "Fortiap-s" | - | - |
Safe
|
Fortinet Search vendor "Fortinet" | Fortiap-w2 Search vendor "Fortinet" for product "Fortiap-w2" | <= 6.0.5 Search vendor "Fortinet" for product "Fortiap-w2" and version " <= 6.0.5" | - |
Affected
| in | Fortinet Search vendor "Fortinet" | Fortiap-w2 Search vendor "Fortinet" for product "Fortiap-w2" | - | - |
Safe
|
Fortinet Search vendor "Fortinet" | Fortiap-w2 Search vendor "Fortinet" for product "Fortiap-w2" | >= 6.2.0 <= 6.2.2 Search vendor "Fortinet" for product "Fortiap-w2" and version " >= 6.2.0 <= 6.2.2" | - |
Affected
| in | Fortinet Search vendor "Fortinet" | Fortiap-w2 Search vendor "Fortinet" for product "Fortiap-w2" | - | - |
Safe
|
Fortinet Search vendor "Fortinet" | Fortiap-u Search vendor "Fortinet" for product "Fortiap-u" | <= 6.0.1 Search vendor "Fortinet" for product "Fortiap-u" and version " <= 6.0.1" | - |
Affected
| in | Fortinet Search vendor "Fortinet" | Fortiap-u Search vendor "Fortinet" for product "Fortiap-u" | - | - |
Safe
|