VYPR
High severity7.2NVD Advisory· Published Oct 5, 2016· Updated May 6, 2026

CVE-2016-7561

CVE-2016-7561

Description

Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 allow administrators to obtain sensitive user credentials by reading the pam.log file.

Affected products

6
  • Fortinet/Fortiwlc6 versions
    cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*+ 5 more
    • cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*range: <=6.1-2-29
    • cpe:2.3:a:fortinet:fortiwlc:7.0-10-0:*:*:*:*:*:*:*
    • cpe:2.3:a:fortinet:fortiwlc:7.0-9-1:*:*:*:*:*:*:*
    • cpe:2.3:a:fortinet:fortiwlc:8.0-5-0:*:*:*:*:*:*:*
    • cpe:2.3:a:fortinet:fortiwlc:8.1-2-0:*:*:*:*:*:*:*
    • cpe:2.3:a:fortinet:fortiwlc:8.2-4-0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.