FortiWLM App
- Vulnérabilités connues
- 23
- Toujours ouvertes
- 0
- KEV ouvertes
- 0
- Score CVSS max
- 9.8
Score Sécurité
Excellent · 100/100
Composite : 50% CVE ouvertes + 40% KEV ouvertes + 10% vélocité vendor.
Voir le détail
- CVE ouvertes 0/-50 0 CVE
- KEV ouvertes 0/-40 0 KEV
- Vendor 0/-10 100% à jour
Tester une autre version
Évalue le risque pour une version donnée (par défaut : version courante du store).
Description
FortiWLM is a network manager application which manages wireless networks in an enterprise. Wireless networking has become an essential component of enterprise’s success as it is being used in missing critical applications like hospitals and manufacturing. FortiWLM iOS app helps FortiWLM network admins to troubleshoot client problems and also get notified in case of network problems when they are on the go. Here are the features supported Overview of AP groups with: - Alarms, online and offline APs. - Station count. - Multiline graph for number of stations and throughput. Alarms: - List of critical, major and minor alarms. - Filters based on alarm raised dates, acknowledge status, controller and access point - Ability to mark alarms an acknowledged. - Share alarms. - Notifications on new critical alarms. Stations - Search by mac address and wildcard. Filter by dates. - Station details like info, history and station logs. Activities - Syslog’s generated with filter functionality. **** Compatibility **** Required iOS 8.0 and above FortiWLM v8.3 and above are supported
Données collectées et partagées
App Privacy pas encore récupérée pour cette app. Sera tentée au prochain cycle d'enrichissement.
Vulnérabilités (CVE) connues
| CVE | Statut | Sévérité | KEV | Publié | Corrigé en |
|---|---|---|---|---|---|
|
CVE-2023-34990
CRITICAL 9.8
Corrigé en: 8.6.6
|
Inconnu | CRITICAL 9.8 | — | 8.6.6 | |
|
CVE-2023-48782
HIGH 8.8
Corrigé en: 8.6.5+
|
Inconnu | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2023-42783
HIGH 7.5
|
Inconnu | HIGH 7.5 | — | — | |
|
CVE-2023-34991
CRITICAL 9.8
|
Inconnu | CRITICAL 9.8 | — | — | |
|
CVE-2023-36550
CRITICAL 9.8
Corrigé en: 8.6.5+
|
Inconnu | CRITICAL 9.8 | — | 8.6.5+ | |
|
CVE-2023-34985
HIGH 8.8
Corrigé en: 8.6.5+
|
Inconnu | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2023-34986
HIGH 8.8
Corrigé en: 8.6.5+
|
Inconnu | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2023-34987
HIGH 8.8
Corrigé en: 8.6.5+
|
Inconnu | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2023-34988
HIGH 8.8
Corrigé en: 8.6.5+
|
Inconnu | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2023-34989
HIGH 8.8
Corrigé en: 8.6.5+
|
Inconnu | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2023-34993
CRITICAL 9.8
Corrigé en: 8.6.5+
|
Inconnu | CRITICAL 9.8 | — | 8.6.5+ | |
|
CVE-2023-36547
CRITICAL 9.8
Corrigé en: 8.6.5+
|
Inconnu | CRITICAL 9.8 | — | 8.6.5+ | |
|
CVE-2023-36548
CRITICAL 9.8
Corrigé en: 8.6.5+
|
Inconnu | CRITICAL 9.8 | — | 8.6.5+ | |
|
CVE-2023-36549
HIGH 8.8
Corrigé en: 8.6.5+
|
Inconnu | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2021-43070
MEDIUM 5.4
|
Inconnu | MEDIUM 5.4 | — | — | |
|
CVE-2021-43075
HIGH 8.8
Corrigé en: 8.6.3
|
Inconnu | HIGH 8.8 | — | 8.6.3 | |
|
CVE-2021-43077
HIGH 8.8
Corrigé en: 8.6.3
|
Inconnu | HIGH 8.8 | — | 8.6.3 | |
|
CVE-2021-41029
MEDIUM 6.4
Corrigé en: 8.6.1+
|
Inconnu | MEDIUM 6.4 | — | 8.6.1+ | |
|
CVE-2021-42752
MEDIUM 5.4
Corrigé en: 8.6.1+
|
Inconnu | MEDIUM 5.4 | — | 8.6.1+ | |
|
CVE-2021-42760
HIGH 8.8
Corrigé en: 8.6.1+
|
Inconnu | HIGH 8.8 | — | 8.6.1+ | |
|
CVE-2021-36184
HIGH 8.8
Corrigé en: 8.6.1+
|
Inconnu | HIGH 8.8 | — | 8.6.1+ | |
|
CVE-2021-36185
HIGH 8.8
Corrigé en: 8.6.1+
|
Inconnu | HIGH 8.8 | — | 8.6.1+ | |
|
CVE-2017-7336
CRITICAL 9.8
Corrigé en: 8.3.0+
|
Inconnu | CRITICAL 9.8 | — | 8.3.0+ |
Autres apps de l'éditeur