Page 2 of 21 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

11 May 2022 — An incorrect permission assignment for critical resource vulnerability [CWE-732] in FortiClient for Linux version 6.0.8 and below, 6.2.9 and below, 6.4.7 and below, 7.0.2 and below may allow an unauthenticated attacker to access sensitive information in log files and directories via symbolic links. Una asignación incorrecta de permisos para la vulnerabilidad de recursos críticos [CWE-732] en FortiClient para Linux versión 6.0.8 y anteriores, 6.2.9 y anteriores, 6.4.7 y anteriores, 7.0.2 y anteriores, puede ... • https://fortiguard.com/psirt/FG-IR-21-232 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 8.0EPSS: 0%CPEs: 2EXPL: 0

06 Apr 2022 — An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient for Linux 6.2.x before 6.2.9 may allow an unauthenticated attacker to execute arbitrary code on the host operating system as root via tricking the user into connecting to a network with a malicious name. Una vulnerabilidad de comprobación de entrada inapropiada en FortiClient para Linux versiones 6.4.x anteriores a 6.4.3, FortiClient para Linux versiones 6.2.x anteriores a 6.2.9, puede permitir que un atacant... • https://fortiguard.com/advisory/FG-IR-20-241 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

06 Apr 2022 — A improper initialization in Fortinet FortiClient (Windows) version 6.0.10 and below, version 6.2.9 and below, version 6.4.7 and below, version 7.0.3 and below allows attacker to gain administrative privileges via placing a malicious executable inside the FortiClient installer's directory. Una inicialización incorrecta en Fortinet FortiClient (Windows) versiones 6.0.10 y anteriores, versiones 6.2.9 y anteriores, versiones 6.4.7 y anteriores, versiones 7.0.3 y anteriores, permite a un atacante obtener privil... • https://fortiguard.com/psirt/FG-IR-21-238 • CWE-665: Improper Initialization •

CVSS: 5.3EPSS: 0%CPEs: 5EXPL: 0

06 Apr 2022 — An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient for Linux version 7.0.2 and below, 6.4.7 and below and 6.2.9 and below may allow an unauthenticated attacker to access the confighandler webserver via external binaries. Una vulnerabilidad de exposición de información confidencial a un actor no autorizado [CWE-200] en FortiClient para Linux versión 7.0.2 y anteriores, 6.4.7 y anteriores y versiones 6.2.9 y anteriores, puede permitir a un atacante no autentic... • https://fortiguard.com/psirt/FG-IR-21-226 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.2EPSS: 0%CPEs: 18EXPL: 0

16 Dec 2021 — A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol. Una combinación de una vulnerabilidad de clave criptográfica embebida [CWE... • https://fortiguard.com/advisory/FG-IR-21-075 • CWE-295: Improper Certificate Validation CWE-798: Use of Hard-coded Credentials •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

09 Dec 2021 — An improper authorization vulnerabiltiy [CWE-285] in FortiClient Windows versions 7.0.0 and 6.4.6 and below and 6.2.8 and below may allow an unauthenticated attacker to bypass the webfilter control via modifying the session-id paramater. Una vulnerabilidad de autorización inapropiada [CWE-285] en FortiClient Windows versiones 7.0.0 y 6.4.6 y anteriores y 6.2.8 y anteriores, puede permitir a un atacante no autenticado omitir el control del filtro web por medio de la modificación del parámetro session-id • https://fortiguard.com/advisory/FG-IR-20-127 •

CVSS: 4.9EPSS: 0%CPEs: 36EXPL: 0

09 Dec 2021 — A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions. Un control inapropiado de un recurso a lo largo de su vida en Fortinet FortiClientWindows versión 6.4.1 y 6.4.0, versión 6.2.9 y anteriores, versión 6.0.10 y anteriores, permite a un atacante causar una denegación de servicio completa ... • https://fortiguard.com/advisory/FG-IR-21-167 •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

01 Dec 2021 — An unsafe search path vulnerability in FortiClientWindows 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x and FortiClientEMS 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x may allow an attacker to perform a DLL Hijack attack on affected devices via a malicious OpenSSL engine library in the search path. Una vulnerabilidad de ruta de búsqueda no segura en FortiClientWindows versiones 7.0.0, 6.4.6 y anteriores, 6.2.x, 6.0.x y FortiClientEMS 7.0.0, 6.4.6 y anteriores, 6.2.x, 6.0.x puede permitir a un atacante llevar a cabo un ataqu... • https://fortiguard.com/advisory/FG-IR-21-088 • CWE-427: Uncontrolled Search Path Element •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

02 Nov 2021 — An improper control of generation of code vulnerability [CWE-94] in FortiClientMacOS versions 7.0.0 and below and 6.4.5 and below may allow an authenticated attacker to hijack the MacOS camera without the user permission via the malicious dylib file. Una vulnerabilidad de control inapropiado de generación de código [CWE-94] en FortiClientMacOS versiones 7.0.0 y por debajo y 6.4.5 y por debajo, puede permitir a un atacante autenticado secuestrar la cámara de MacOS sin el permiso del usuario por medio del arc... • https://fortiguard.com/advisory/FG-IR-21-079 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

02 Nov 2021 — An improper authorization vulnerability [CWE-285] in FortiClient for Windows versions 7.0.1 and below and 6.4.2 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for Forticlient updates. Una vulnerabilidad de autorización inapropiada [CWE-285] en FortiClient para Windows versiones 7.0.1 y por debajo y versiones 6.4.2 y por debajo, puede permitir a un atacante local no privilegiado escalar sus privilegios a SYSTEM por medio de la tubería c... • https://fortiguard.com/advisory/FG-IR-20-079 •