
CVE-2021-24019
https://notcve.org/view.php?id=CVE-2021-24019
06 Oct 2021 — An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks) Una vulnerabilidad de caducidad de sesión insuficiente [CWE- 613] en FortiClientEMS versiones 6.4.2 y por debajo, versiones 6.2.8 y por debajo, puede permitir a un atacante reusar los ID de sesión del usuario a... • https://github.com/cnetsec/CVE-2021-24019 • CWE-613: Insufficient Session Expiration •

CVE-2020-15941
https://notcve.org/view.php?id=CVE-2020-15941
06 Oct 2021 — A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages. Una vulnerabilidad de salto de ruta [CWE-22] en FortiClientEMS versiones 6.4.1 y por debajo; versiones 6.2.8 y por debajo, puede permitir a un atacante autenticado inyectar secuencias de caracteres de salto de directorio para añadir/borrar l... • https://fortiguard.com/advisory/FG-IR-20-074 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2021-26089 – Fortinet FortiClient Incorrect Permission Assignment Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2021-26089
17 Jun 2021 — An improper symlink following in FortiClient for Mac 6.4.3 and below may allow an non-privileged user to execute arbitrary privileged shell commands during installation phase. Un seguimiento inapropiado de los enlaces simbólicos en FortiClient para Mac versiones 6.4.3 y por debajo, puede permitir a un usuario no privilegiado ejecutar comandos de shell con privilegios arbitrarios durante la fase de instalación This vulnerability allows local attackers to escalate privileges on affected installations of Forti... • https://fortiguard.com/advisory/FG-IR-21-022 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2019-16150
https://notcve.org/view.php?id=CVE-2019-16150
04 Jun 2020 — Use of a hard-coded cryptographic key to encrypt security sensitive data in local storage and configuration in FortiClient for Windows prior to 6.4.0 may allow an attacker with access to the local storage or the configuration backup file to decrypt the sensitive data via knowledge of the hard-coded key. El uso de una clave criptográfica embebida para cifrar datos confidenciales de seguridad en el almacenamiento local y la configuración en FortiClient para Windows versiones anteriores a 6.4.0, puede permitir... • https://fortiguard.com/psirt/FG-IR-19-194 • CWE-798: Use of Hard-coded Credentials •

CVE-2020-9291
https://notcve.org/view.php?id=CVE-2020-9291
01 Jun 2020 — An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack. Una Vulnerabilidad de Archivos Temporales No Seguros en FortiClient para Windows versiones 6.2.1 y posteriores, puede permitir a un usuario local alcanzar privilegios elevados por medio del agotamiento del conjunto de nombres de archivos temporales combinado con un ataque de enlace simbólic... • https://fortiguard.com/psirt/FG-IR-20-040 • CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2020-9287
https://notcve.org/view.php?id=CVE-2020-9287
15 Mar 2020 — An Unsafe Search Path vulnerability in FortiClient EMS online installer 6.2.1 and below may allow a local attacker with control over the directory in which FortiClientEMSOnlineInstaller.exe resides to execute arbitrary code on the system via uploading malicious Filter Library DLL files in that directory. Una vulnerabilidad de Ruta de búsqueda No Segura en FortiClient EMS online installer versiones 6.2.1 y por debajo, puede permitir que un atacante local, con control sobre el directorio en el archivo FortiCl... • https://fortiguard.com/psirt/FG-IR-19-060 • CWE-427: Uncontrolled Search Path Element •

CVE-2020-9290
https://notcve.org/view.php?id=CVE-2020-9290
15 Mar 2020 — An Unsafe Search Path vulnerability in FortiClient for Windows online installer 6.2.3 and below may allow a local attacker with control over the directory in which FortiClientOnlineInstaller.exe and FortiClientVPNOnlineInstaller.exe resides to execute arbitrary code on the system via uploading malicious Filter Library DLL files in that directory. Una vulnerabilidad de Ruta de Búsqueda No Segura en FortiClient for Windows online installer versiones 6.2.3 y por debajo, puede permitir que un atacante local, co... • https://fortiguard.com/psirt/FG-IR-19-060 • CWE-427: Uncontrolled Search Path Element •

CVE-2019-17658
https://notcve.org/view.php?id=CVE-2019-17658
12 Mar 2020 — An unquoted service path vulnerability in the FortiClient FortiTray component of FortiClientWindows v6.2.2 and prior allow an attacker to gain elevated privileges via the FortiClientConsole executable service path. Una vulnerabilidad de ruta de servicio no citada en el componente FortiTray de FortiClient de FortiClientWindows versiones v6.2.2 y anteriores, permite a un atacante alcanzar privilegios elevados por medio de la ruta de servicio ejecutable de FortiClientConsole. • https://github.com/Ibonok/CVE-2019-17658 • CWE-428: Unquoted Search Path or Element •

CVE-2019-16155
https://notcve.org/view.php?id=CVE-2019-16155
07 Feb 2020 — A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to overwrite system files as root with arbitrary content through system backup file via specially crafted "BackupConfig" type IPC client requests to the fctsched process. Further more, FortiClient for Linux 6.2.2 and below allow low privilege user write the system backup file under root privilege through GUI thus can cause root system file overwrite. Una vulnerabilidad de escalada de privilegios... • https://danishcyberdefence.dk/blog/forticlient_linux •

CVE-2019-16152
https://notcve.org/view.php?id=CVE-2019-16152
06 Feb 2020 — A Denial of service (DoS) vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to cause FortiClient processes running under root privilege crashes via sending specially crafted IPC client requests to the fctsched process due the nanomsg not been correctly validated. Una vulnerabilidad de denegación de servicio (DoS) en FortiClient para Linux versiones 6.2.1 y posteriores, puede permitir a un usuario con privilegios bajos causar que los procesos de FortiClient se ejecut... • https://danishcyberdefence.dk/blog/forticlient_linux • CWE-20: Improper Input Validation •