Improper Authentication in FortiOS - CVE-2015-7361
Published: October 15, 2015 / Updated: August 9, 2020
FortiOS
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
FortiOS 5.2.3, when configured to use High Availability (HA) and the dedicated management interface is enabled, does not require authentication for access to the ZebOS shell on the HA dedicated management interface, which allows remote attackers to obtain shell access via unspecified vectors.