Page 2 of 22 results (0.001 seconds)

CVSS: 7.7EPSS: 0%CPEs: 4EXPL: 0

18 Jul 2022 — An execution with unnecessary privileges vulnerability [CWE-250] in FortiClientWindows 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.10 may allow a local attacker to perform an arbitrary file write on the system. Una vulnerabilidad de ejecución con privilegios no necesarios [CWE-250] en FortiClientWindows versiones 7.0.0 hasta 7.0.3, 6.4.0 hasta 6.4.7, 6.2.0 hasta 6.2.9, 6.0.0 hasta 6.0.10, puede permitir a un atacante local llevar a cabo una escritura arbitraria de archiv... • https://fortiguard.com/psirt/FG-IR-22-044 • CWE-269: Improper Privilege Management •

CVSS: 8.4EPSS: 0%CPEs: 2EXPL: 0

11 May 2022 — A external control of file name or path in Fortinet FortiClientWindows version 7.0.2 and below, version 6.4.6 and below, version 6.2.9 and below, version 6.0.10 and below allows attacker to escalate privilege via the MSI installer. Un control externo de nombre de archivo o ruta en Fortinet FortiClientWindows versiones 7.0.2 y anteriores, versiones 6.4.6 y anteriores, versiones 6.2.9 y anteriores, versiones 6.0.10 y anteriores, permite a un atacante escalar privilegios por medio del instalador MSI • https://fortiguard.com/advisory/FG-IR-21-154 • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

11 May 2022 — An incorrect permission assignment for critical resource vulnerability [CWE-732] in FortiClient for Linux version 6.0.8 and below, 6.2.9 and below, 6.4.7 and below, 7.0.2 and below may allow an unauthenticated attacker to access sensitive information in log files and directories via symbolic links. Una asignación incorrecta de permisos para la vulnerabilidad de recursos críticos [CWE-732] en FortiClient para Linux versión 6.0.8 y anteriores, 6.2.9 y anteriores, 6.4.7 y anteriores, 7.0.2 y anteriores, puede ... • https://fortiguard.com/psirt/FG-IR-21-232 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

06 Apr 2022 — A improper initialization in Fortinet FortiClient (Windows) version 6.0.10 and below, version 6.2.9 and below, version 6.4.7 and below, version 7.0.3 and below allows attacker to gain administrative privileges via placing a malicious executable inside the FortiClient installer's directory. Una inicialización incorrecta en Fortinet FortiClient (Windows) versiones 6.0.10 y anteriores, versiones 6.2.9 y anteriores, versiones 6.4.7 y anteriores, versiones 7.0.3 y anteriores, permite a un atacante obtener privil... • https://fortiguard.com/psirt/FG-IR-21-238 • CWE-665: Improper Initialization •

CVSS: 5.3EPSS: 0%CPEs: 5EXPL: 0

06 Apr 2022 — An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient for Linux version 7.0.2 and below, 6.4.7 and below and 6.2.9 and below may allow an unauthenticated attacker to access the confighandler webserver via external binaries. Una vulnerabilidad de exposición de información confidencial a un actor no autorizado [CWE-200] en FortiClient para Linux versión 7.0.2 y anteriores, 6.4.7 y anteriores y versiones 6.2.9 y anteriores, puede permitir a un atacante no autentic... • https://fortiguard.com/psirt/FG-IR-21-226 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.2EPSS: 0%CPEs: 18EXPL: 0

16 Dec 2021 — A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol. Una combinación de una vulnerabilidad de clave criptográfica embebida [CWE... • https://fortiguard.com/advisory/FG-IR-21-075 • CWE-295: Improper Certificate Validation CWE-798: Use of Hard-coded Credentials •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

09 Dec 2021 — An improper authorization vulnerabiltiy [CWE-285] in FortiClient Windows versions 7.0.0 and 6.4.6 and below and 6.2.8 and below may allow an unauthenticated attacker to bypass the webfilter control via modifying the session-id paramater. Una vulnerabilidad de autorización inapropiada [CWE-285] en FortiClient Windows versiones 7.0.0 y 6.4.6 y anteriores y 6.2.8 y anteriores, puede permitir a un atacante no autenticado omitir el control del filtro web por medio de la modificación del parámetro session-id • https://fortiguard.com/advisory/FG-IR-20-127 •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

09 Dec 2021 — A missing encryption of sensitive data in Fortinet FortiClientEMS version 7.0.1 and below, version 6.4.4 and below allows attacker to information disclosure via inspecting browser decrypted data Una falta de encriptación de datos confidenciales en Fortinet FortiClientEMS versión 7.0.1 y anteriores, versión 6.4.4 y anteriores permite a un atacante la divulgación de información por medio de la inspección de los datos descifrados del navegador • https://fortiguard.com/advisory/FG-IR-21-140 • CWE-311: Missing Encryption of Sensitive Data •

CVSS: 9.1EPSS: 0%CPEs: 4EXPL: 0

08 Dec 2021 — An authentication bypass by capture-replay vulnerability [CWE-294] in FortiClient EMS versions 7.0.1 and below and 6.4.4 and below may allow an unauthenticated attacker to impersonate an existing user by intercepting and re-using valid SAML authentication messages. Una vulnerabilidad de omisión de autenticación por captura-repetición [CWE-294] en FortiClient EMS versiones 7.0.1 y anteriores y versiones 6.4.4 y anteriores, puede permitir a un atacante no autenticado hacerse pasar por un usuario existente al ... • https://fortiguard.com/advisory/FG-IR-21-192 • CWE-294: Authentication Bypass by Capture-replay •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

01 Dec 2021 — An unsafe search path vulnerability in FortiClientWindows 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x and FortiClientEMS 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x may allow an attacker to perform a DLL Hijack attack on affected devices via a malicious OpenSSL engine library in the search path. Una vulnerabilidad de ruta de búsqueda no segura en FortiClientWindows versiones 7.0.0, 6.4.6 y anteriores, 6.2.x, 6.0.x y FortiClientEMS 7.0.0, 6.4.6 y anteriores, 6.2.x, 6.0.x puede permitir a un atacante llevar a cabo un ataqu... • https://fortiguard.com/advisory/FG-IR-21-088 • CWE-427: Uncontrolled Search Path Element •