A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-9282 A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.
Fixes

Solution

Please upgrade to FortiWLC versions 8.6.0 or above. Please upgrade to FortiWLC versions 8.5.3 or above.


Workaround

No workaround given by the vendor.

History

Thu, 24 Jul 2025 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-798
CPEs cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*

Mon, 17 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 17 Mar 2025 13:30:00 +0000

Type Values Removed Values Added
Description A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.
First Time appeared Fortinet
Fortinet fortiwlc
Weaknesses CWE-284
CPEs cpe:2.3:a:fortinet:fortiwlc:8.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.2.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.4.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.5.2:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiwlc
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-03-18T03:55:16.635Z

Reserved: 2021-01-04T20:14:12.302Z

Link: CVE-2021-22126

cve-icon Vulnrichment

Updated: 2025-03-17T13:36:28.155Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-17T14:15:17.067

Modified: 2025-07-24T20:16:08.390

Link: CVE-2021-22126

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.