FortiWLM App
OS context
This app targets iOS. Installed version not set — push it via /api/admin/apps/bulk-upsert (field current_os_version) to enable precise context.
Security Score
Excellent · 100/100
Composite: 50% open CVEs + 40% open KEVs + 10% vendor velocity.
See breakdown
- Open CVEs 0/-50 0 CVEs
- Open KEVs 0/-40 0 KEVs
- Vendor 0/-10 100% fresh
Test a different version
Evaluates the risk for a given version (default: current store version).
Description
FortiWLM is a network manager application which manages wireless networks in an enterprise. Wireless networking has become an essential component of enterprise’s success as it is being used in missing critical applications like hospitals and manufacturing. FortiWLM iOS app helps FortiWLM network admins to troubleshoot client problems and also get notified in case of network problems when they are on the go. Here are the features supported Overview of AP groups with: - Alarms, online and offline APs. - Station count. - Multiline graph for number of stations and throughput. Alarms: - List of critical, major and minor alarms. - Filters based on alarm raised dates, acknowledge status, controller and access point - Ability to mark alarms an acknowledged. - Share alarms. - Notifications on new critical alarms. Stations - Search by mac address and wildcard. Filter by dates. - Station details like info, history and station logs. Activities - Syslog’s generated with filter functionality. **** Compatibility **** Required iOS 8.0 and above FortiWLM v8.3 and above are supported
Data collected and shared
App Privacy not yet fetched for this app. Will be retried in the next enrichment cycle.
Known vulnerabilities (CVE)
| CVE | Status | Severity | KEV | Published | Fixed in |
|---|---|---|---|---|---|
| CVE-2023-34990 | Unknown | CRITICAL 9.8 | — | 8.6.6 | |
| CVE-2023-48782 | Unknown | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2023-42783 | Unknown | HIGH 7.5 | — | — | |
| CVE-2023-34991 | Unknown | CRITICAL 9.8 | — | — | |
| CVE-2023-36550 | Unknown | CRITICAL 9.8 | — | 8.6.5+ | |
| CVE-2023-34985 | Unknown | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2023-34986 | Unknown | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2023-34987 | Unknown | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2023-34988 | Unknown | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2023-34989 | Unknown | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2023-34993 | Unknown | CRITICAL 9.8 | — | 8.6.5+ | |
| CVE-2023-36547 | Unknown | CRITICAL 9.8 | — | 8.6.5+ | |
| CVE-2023-36548 | Unknown | CRITICAL 9.8 | — | 8.6.5+ | |
| CVE-2023-36549 | Unknown | HIGH 8.8 | — | 8.6.5+ | |
| CVE-2021-43070 | Unknown | MEDIUM 5.4 | — | — | |
| CVE-2021-43075 | Unknown | HIGH 8.8 | — | 8.6.3 | |
| CVE-2021-43077 | Unknown | HIGH 8.8 | — | 8.6.3 | |
| CVE-2021-41029 | Unknown | MEDIUM 6.4 | — | 8.6.1+ | |
| CVE-2021-42752 | Unknown | MEDIUM 5.4 | — | 8.6.1+ | |
| CVE-2021-42760 | Unknown | HIGH 8.8 | — | 8.6.1+ | |
| CVE-2021-36184 | Unknown | HIGH 8.8 | — | 8.6.1+ | |
| CVE-2021-36185 | Unknown | HIGH 8.8 | — | 8.6.1+ | |
| CVE-2017-7336 | Unknown | CRITICAL 9.8 | — | 8.3.0+ |
Other apps by this publisher