ID

VAR-201702-0118


CVE

CVE-2016-8494


TITLE

Fortinet Connect Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2016-007771

DESCRIPTION

Insufficient verification of uploaded files allows attackers with webui administrators privileges to perform arbitrary code execution by uploading a new webui theme. Fortinet Connect is prone to a remote code-execution vulnerability. Failed attempts may lead to denial-of-service conditions. Fortinet Connect 14.2, 14.10, 15.10 and 16.7 are vulnerable. Fortinet Connect is a network security access device developed by Fortinet based on device and user policy deployment. A security vulnerability exists in Fortinet Connect due to the program's insufficient validation of uploaded files. The following versions are affected: Fortinet Connect versions 14.2, 14.10, 15.10, 16.7

Trust: 1.98

sources: NVD: CVE-2016-8494 // JVNDB: JVNDB-2016-007771 // BID: 96159 // VULHUB: VHN-97314

AFFECTED PRODUCTS

vendor:fortinetmodel:connectscope:eqversion:16.7

Trust: 1.9

vendor:fortinetmodel:connectscope:eqversion:15.10

Trust: 1.9

vendor:fortinetmodel:connectscope:eqversion:14.2

Trust: 1.9

vendor:fortinetmodel:connectscope:eqversion:14.10

Trust: 1.9

vendor:fortinetmodel:connectscope: - version: -

Trust: 0.8

vendor:fortinetmodel:connectscope:neversion:16.7.0.1

Trust: 0.3

vendor:fortinetmodel:connectscope:neversion:15.10.0.3

Trust: 0.3

vendor:fortinetmodel:connectscope:neversion:14.2.0.12

Trust: 0.3

vendor:fortinetmodel:connectscope:neversion:14.10.0.5

Trust: 0.3

sources: BID: 96159 // JVNDB: JVNDB-2016-007771 // NVD: CVE-2016-8494 // CNNVD: CNNVD-201702-363

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2016-8494
value: HIGH

Trust: 1.8

CNNVD: CNNVD-201702-363
value: MEDIUM

Trust: 0.6

VULHUB: VHN-97314
value: MEDIUM

Trust: 0.1

NVD:
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2016-8494
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-97314
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

NVD:
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: CVE-2016-8494
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-97314 // JVNDB: JVNDB-2016-007771 // NVD: CVE-2016-8494 // CNNVD: CNNVD-201702-363

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-97314 // JVNDB: JVNDB-2016-007771 // NVD: CVE-2016-8494

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-363

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201702-363

CONFIGURATIONS

sources: NVD: CVE-2016-8494

PATCH

title:Fortinet Connect admin able to gain root accessurl:https://fortiguard.com/advisory/fg-ir-16-080

Trust: 0.8

title:Fortinet Connect Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=67670

Trust: 0.6

sources: JVNDB: JVNDB-2016-007771 // CNNVD: CNNVD-201702-363

EXTERNAL IDS

db:NVDid:CVE-2016-8494

Trust: 2.8

db:BIDid:96159

Trust: 1.4

db:JVNDBid:JVNDB-2016-007771

Trust: 0.8

db:CNNVDid:CNNVD-201702-363

Trust: 0.7

db:VULHUBid:VHN-97314

Trust: 0.1

sources: VULHUB: VHN-97314 // BID: 96159 // JVNDB: JVNDB-2016-007771 // NVD: CVE-2016-8494 // CNNVD: CNNVD-201702-363

REFERENCES

url:https://fortiguard.com/advisory/fg-ir-16-080

Trust: 2.0

url:http://www.securityfocus.com/bid/96159

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8494

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8494

Trust: 0.8

url:http://www.fortinet.com/

Trust: 0.3

sources: VULHUB: VHN-97314 // BID: 96159 // JVNDB: JVNDB-2016-007771 // NVD: CVE-2016-8494 // CNNVD: CNNVD-201702-363

CREDITS

Spencer Lowe.

Trust: 0.3

sources: BID: 96159

SOURCES

db:VULHUBid:VHN-97314
db:BIDid:96159
db:JVNDBid:JVNDB-2016-007771
db:NVDid:CVE-2016-8494
db:CNNVDid:CNNVD-201702-363

LAST UPDATE DATE

2023-12-18T13:29:25.996000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-97314date:2017-03-01T00:00:00
db:BIDid:96159date:2017-03-07T04:01:00
db:JVNDBid:JVNDB-2016-007771date:2017-03-16T00:00:00
db:NVDid:CVE-2016-8494date:2017-03-01T02:59:02.560
db:CNNVDid:CNNVD-201702-363date:2017-02-14T00:00:00

SOURCES RELEASE DATE

db:VULHUBid:VHN-97314date:2017-02-09T00:00:00
db:BIDid:96159date:2017-02-09T00:00:00
db:JVNDBid:JVNDB-2016-007771date:2017-03-16T00:00:00
db:NVDid:CVE-2016-8494date:2017-02-09T15:59:01.283
db:CNNVDid:CNNVD-201702-363date:2017-02-14T00:00:00