FortiWLM App
Contexte OS
Cette app cible iOS. Version installée non renseignée — pousser via /api/admin/apps/bulk-upsert (champ current_os_version) pour activer le contexte précis.
Score Sécurité
Excellent · 100/100
Composite : 50% CVE ouvertes + 40% KEV ouvertes + 10% vélocité vendor.
Voir le détail
- CVE ouvertes 0/-50 0 CVE
- KEV ouvertes 0/-40 0 KEV
- Vendor 0/-10 100% à jour
Tester une autre version
Évalue le risque pour une version donnée (par défaut : version courante du store).
Description
FortiWLM is a network manager application which manages wireless networks in an enterprise. Wireless networking has become an essential component of enterprise’s success as it is being used in missing critical applications like hospitals and manufacturing. FortiWLM iOS app helps FortiWLM network admins to troubleshoot client problems and also get notified in case of network problems when they are on the go. Here are the features supported Overview of AP groups with: - Alarms, online and offline APs. - Station count. - Multiline graph for number of stations and throughput. Alarms: - List of critical, major and minor alarms. - Filters based on alarm raised dates, acknowledge status, controller and access point - Ability to mark alarms an acknowledged. - Share alarms. - Notifications on new critical alarms. Stations - Search by mac address and wildcard. Filter by dates. - Station details like info, history and station logs. Activities - Syslog’s generated with filter functionality. **** Compatibility **** Required iOS 8.0 and above FortiWLM v8.3 and above are supported
Données collectées et partagées
App Privacy pas encore récupérée pour cette app. Sera tentée au prochain cycle d'enrichissement.
Vulnérabilités (CVE) connues
| CVE | Statut | Sévérité | KEV | Publié | Corrigé en |
|---|---|---|---|---|---|
| CVE-2023-34990 | Inconnu | CRITICAL 9.8 | — | 8.6.6 | |
| CVE-2023-48782 | Inconnu | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2023-42783 | Inconnu | HIGH 7.5 | — | — | |
| CVE-2023-34991 | Inconnu | CRITICAL 9.8 | — | — | |
| CVE-2023-36550 | Inconnu | CRITICAL 9.8 | — | 8.6.5+ | |
| CVE-2023-34985 | Inconnu | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2023-34986 | Inconnu | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2023-34987 | Inconnu | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2023-34988 | Inconnu | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2023-34989 | Inconnu | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2023-34993 | Inconnu | CRITICAL 9.8 | — | 8.6.5+ | |
| CVE-2023-36547 | Inconnu | CRITICAL 9.8 | — | 8.6.5+ | |
| CVE-2023-36548 | Inconnu | CRITICAL 9.8 | — | 8.6.5+ | |
| CVE-2023-36549 | Inconnu | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2021-43070 | Inconnu | MEDIUM 5.4 | — | — | |
| CVE-2021-43075 | Inconnu | HIGH 8.8 | — | 8.6.3 | |
| CVE-2021-43077 | Inconnu | HIGH 8.8 | — | 8.6.3 | |
| CVE-2021-41029 | Inconnu | MEDIUM 6.4 | — | 8.6.1+ | |
| CVE-2021-42752 | Inconnu | MEDIUM 5.4 | — | 8.6.1+ | |
| CVE-2021-42760 | Inconnu | HIGH 8.8 | — | 8.6.1+ | |
| CVE-2021-36184 | Inconnu | HIGH 8.8 | — | 8.6.1+ | |
| CVE-2021-36185 | Inconnu | HIGH 8.8 | — | 8.6.1+ | |
| CVE-2017-7336 | Inconnu | CRITICAL 9.8 | — | 8.3.0+ |
Autres apps de l'éditeur