Missing Authentication for critical function in CAPWAP daemon
Summary
A missing authentication for critical function vulnerability [CWE-306] in FortiOS and FortiSwitchManager CAPWAP daemon may allow a local unauthenticated attacker on the same local IP subnet to write device configuration via specially crafted requests. To be successful, this attack requires the targeted FortiGate device to run a specific, non default configuration.
| Version | Affected | Solution |
|---|---|---|
| FortiOS 7.6 | 7.6.0 through 7.6.3 | Upgrade to 7.6.4 or above |
| FortiOS 7.4 | 7.4.0 through 7.4.8 | Upgrade to 7.4.9 or above |
| FortiOS 7.2 | 7.2.0 through 7.2.11 | Upgrade to 7.2.12 or above |
| FortiOS 7.0 | 7.0.0 through 7.0.17 | Upgrade to 7.0.18 or above |
| FortiOS 6.4 | 6.4 all versions | Migrate to a fixed release |
| FortiOS 6.2 | 6.2.9 through 6.2.17 | Migrate to a fixed release |
Workaround :
Disable security fabric access into interface.
Only allow legit devices in Wifi Controller > Managed FortiAPs
Remove inter-controller-peer elements in config wireless-controller inter-controller configuration
Warning :
If auto-auth-extension-device is enabled in config system interface, any device
can be authorized and then the vulnerability can be exploited without administrator
authorization.
Please note that auto-auth-extension-device is disabled by default
If inter-controller-peer is set, it is strongly advised to change the inter-controller-key setting, even for fixed versions.
Acknowledgement
Internally discovered and reported by Gwendal Guégniaud of Fortinet Product Security Team.Timeline
2026-04-14: Initial publication