Files
CVEs-PoC/2016/CVE-2016-7542.md
T
2025-09-29 21:09:30 +02:00

18 lines
799 B
Markdown

### [CVE-2016-7542](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7542)
![](https://img.shields.io/static/v1?label=Product&message=FortiOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.2.0%20-%205.2.9%2C%205.4.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20leak&color=brightgreen)
### Description
A read-only administrator on Fortinet devices with FortiOS 5.2.x before 5.2.10 GA and 5.4.x before 5.4.2 GA may have access to read-write administrators password hashes (not including super-admins) stored on the appliance via the webui REST API, and may therefore be able to crack them.
### POC
#### Reference
- http://fortiguard.com/advisory/FG-IR-16-050
#### Github
No PoCs found on GitHub currently.