{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2021-22126","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2021-01-04T20:14:12.302Z","datePublished":"2025-03-17T13:05:55.333Z","dateUpdated":"2026-02-26T19:09:28.871Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiWLC","cpes":["cpe:2.3:a:fortinet:fortiwlc:8.5.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.5.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.5.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.8:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.3.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.3.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.2.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.2.6:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"8.5.0","lessThanOrEqual":"8.5.2","status":"affected"},{"versionType":"semver","version":"8.4.4","lessThanOrEqual":"8.4.8","status":"affected"},{"versionType":"semver","version":"8.4.0","lessThanOrEqual":"8.4.2","status":"affected"},{"versionType":"semver","version":"8.3.2","lessThanOrEqual":"8.3.3","status":"affected"},{"versionType":"semver","version":"8.2.6","lessThanOrEqual":"8.2.7","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2025-03-17T13:05:55.333Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-284","description":"Improper access control","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X"}}],"solutions":[{"lang":"en","value":"Please upgrade to FortiWLC versions 8.6.0 or above.\nPlease upgrade to FortiWLC versions 8.5.3 or above."}],"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-20-147","url":"https://fortiguard.fortinet.com/psirt/FG-IR-20-147"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2021-22126","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-03-18T03:55:17.682980Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T19:09:28.871Z"}}]}}