FortiWLM App
- Known vulnerabilities
- 23
- Still open
- 0
- KEV open
- 0
- Max CVSS score
- 9.8
Security Score
Excellent · 100/100
Composite: 50% open CVEs + 40% open KEVs + 10% vendor velocity.
See breakdown
- Open CVEs 0/-50 0 CVEs
- Open KEVs 0/-40 0 KEVs
- Vendor 0/-10 100% fresh
Test a different version
Evaluates the risk for a given version (default: current store version).
Description
FortiWLM is a network manager application which manages wireless networks in an enterprise. Wireless networking has become an essential component of enterprise’s success as it is being used in missing critical applications like hospitals and manufacturing. FortiWLM iOS app helps FortiWLM network admins to troubleshoot client problems and also get notified in case of network problems when they are on the go. Here are the features supported Overview of AP groups with: - Alarms, online and offline APs. - Station count. - Multiline graph for number of stations and throughput. Alarms: - List of critical, major and minor alarms. - Filters based on alarm raised dates, acknowledge status, controller and access point - Ability to mark alarms an acknowledged. - Share alarms. - Notifications on new critical alarms. Stations - Search by mac address and wildcard. Filter by dates. - Station details like info, history and station logs. Activities - Syslog’s generated with filter functionality. **** Compatibility **** Required iOS 8.0 and above FortiWLM v8.3 and above are supported
Data collected and shared
App Privacy not yet fetched for this app. Will be retried in the next enrichment cycle.
Known vulnerabilities (CVE)
| CVE | Status | Severity | KEV | Published | Fixed in |
|---|---|---|---|---|---|
|
CVE-2023-34990
CRITICAL 9.8
Fixed in: 8.6.6
|
Unknown | CRITICAL 9.8 | — | 8.6.6 | |
|
CVE-2023-48782
HIGH 8.8
Fixed in: 8.6.5+
|
Unknown | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2023-42783
HIGH 7.5
|
Unknown | HIGH 7.5 | — | — | |
|
CVE-2023-34991
CRITICAL 9.8
|
Unknown | CRITICAL 9.8 | — | — | |
|
CVE-2023-36550
CRITICAL 9.8
Fixed in: 8.6.5+
|
Unknown | CRITICAL 9.8 | — | 8.6.5+ | |
|
CVE-2023-34985
HIGH 8.8
Fixed in: 8.6.5+
|
Unknown | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2023-34986
HIGH 8.8
Fixed in: 8.6.5+
|
Unknown | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2023-34987
HIGH 8.8
Fixed in: 8.6.5+
|
Unknown | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2023-34988
HIGH 8.8
Fixed in: 8.6.5+
|
Unknown | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2023-34989
HIGH 8.8
Fixed in: 8.6.5+
|
Unknown | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2023-34993
CRITICAL 9.8
Fixed in: 8.6.5+
|
Unknown | CRITICAL 9.8 | — | 8.6.5+ | |
|
CVE-2023-36547
CRITICAL 9.8
Fixed in: 8.6.5+
|
Unknown | CRITICAL 9.8 | — | 8.6.5+ | |
|
CVE-2023-36548
CRITICAL 9.8
Fixed in: 8.6.5+
|
Unknown | CRITICAL 9.8 | — | 8.6.5+ | |
|
CVE-2023-36549
HIGH 8.8
Fixed in: 8.6.5+
|
Unknown | HIGH 8.8 | — | 8.6.5+ | |
|
CVE-2021-43070
MEDIUM 5.4
|
Unknown | MEDIUM 5.4 | — | — | |
|
CVE-2021-43075
HIGH 8.8
Fixed in: 8.6.3
|
Unknown | HIGH 8.8 | — | 8.6.3 | |
|
CVE-2021-43077
HIGH 8.8
Fixed in: 8.6.3
|
Unknown | HIGH 8.8 | — | 8.6.3 | |
|
CVE-2021-41029
MEDIUM 6.4
Fixed in: 8.6.1+
|
Unknown | MEDIUM 6.4 | — | 8.6.1+ | |
|
CVE-2021-42752
MEDIUM 5.4
Fixed in: 8.6.1+
|
Unknown | MEDIUM 5.4 | — | 8.6.1+ | |
|
CVE-2021-42760
HIGH 8.8
Fixed in: 8.6.1+
|
Unknown | HIGH 8.8 | — | 8.6.1+ | |
|
CVE-2021-36184
HIGH 8.8
Fixed in: 8.6.1+
|
Unknown | HIGH 8.8 | — | 8.6.1+ | |
|
CVE-2021-36185
HIGH 8.8
Fixed in: 8.6.1+
|
Unknown | HIGH 8.8 | — | 8.6.1+ | |
|
CVE-2017-7336
CRITICAL 9.8
Fixed in: 8.3.0+
|
Unknown | CRITICAL 9.8 | — | 8.3.0+ |
Other apps by this publisher