An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://fortiguard.com/psirt/FG-IR-21-002 | 
                     | 
            
History
                    Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Tue, 21 Jan 2025 21:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:* | 
Fri, 20 Dec 2024 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Thu, 19 Dec 2024 08:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command. | |
| First Time appeared | 
        
        Fortinet
         Fortinet fortiwlc  | 
|
| Weaknesses | CWE-824 | |
| CPEs | cpe:2.3:a:fortinet:fortiwlc:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.1.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.6.0:*:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        Fortinet
         Fortinet fortiwlc  | 
|
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-12-20T17:41:17.833Z
Reserved: 2021-01-25T14:47:15.093Z
Link: CVE-2021-26093
Updated: 2024-12-20T16:45:59.303Z
Status : Analyzed
Published: 2024-12-19T08:15:14.717
Modified: 2025-01-21T20:44:31.650
Link: CVE-2021-26093
No data.