
CVE-2018-9190
https://notcve.org/view.php?id=CVE-2018-9190
08 Feb 2019 — A null pointer dereference vulnerability in Fortinet FortiClientWindows 6.0.2 and earlier allows attacker to cause a denial of service via the NDIS miniport driver. Una vulnerabilidad de desreferencia de puntero NULL en Fortinet FortiClientWindows, en versiones 6.0.2 y anteriores, permite que los atacantes provoquen una denegación de servicio (DoS) mediante el controlador del minipuerto NDIS. • https://fortiguard.com/advisory/FG-IR-18-092 • CWE-476: NULL Pointer Dereference •

CVE-2017-17543
https://notcve.org/view.php?id=CVE-2017-17543
26 Apr 2018 — Users' VPN authentication credentials are unsafely encrypted in Fortinet FortiClient for Windows 5.6.0 and below versions, FortiClient for Mac OSX 5.6.0 and below versions and FortiClient SSLVPN Client for Linux 4.4.2335 and below versions, due to the use of a static encryption key and weak encryption algorithms. Las credenciales de autenticación de VPN de los usuarios se cifran de manera no segura en Fortinet FortiClient para Windows en versiones 5.6.0 y anteriores, FortiClient para Mac OSX en versiones 5.... • https://fortiguard.com/advisory/FG-IR-17-214 • CWE-326: Inadequate Encryption Strength •

CVE-2017-14184
https://notcve.org/view.php?id=CVE-2017-14184
15 Dec 2017 — An Information Disclosure vulnerability in Fortinet FortiClient for Windows 5.6.0 and below versions, FortiClient for Mac OSX 5.6.0 and below versions and FortiClient SSLVPN Client for Linux 4.4.2334 and below versions allows regular users to see each other's VPN authentication credentials due to improperly secured storage locations. Una vulnerabilidad de divulgación de información en Fortinet FortiClient for Windows 5.6.0 y anteriores, FortiClient for Mac OSX 5.6.0 y anteriores y FortiClient SSLVPN Client ... • http://www.securityfocus.com/bid/102123 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2017-7344 – Fortinet FortiClient Windows Privilege Escalation
https://notcve.org/view.php?id=CVE-2017-7344
14 Dec 2017 — A privilege escalation in Fortinet FortiClient Windows 5.4.3 and earlier as well as 5.6.0 allows attacker to gain privilege via exploiting the Windows "security alert" dialog thereby popping up when the "VPN before logon" feature is enabled and an untrusted certificate chain. Una escalada de privilegios en Fortinet FortiClient Windows en versiones 5.4.3 y anteriores, así como la versión 5.6.0, permite que un atacante consiga privilegios explotando el diálogo de Windows "security alert" que aparece cuando la... • https://packetstorm.news/files/id/145611 •

CVE-2016-8493
https://notcve.org/view.php?id=CVE-2016-8493
26 Jun 2017 — In FortiClientWindows 5.4.1 and 5.4.2, an attacker may escalate privilege via a FortiClientNamedPipe vulnerability. En FortiClientWindows versiones 5.4.1 y 5.4.2, un atacante puede escalar privilegios por medio de una vulnerabilidad de FortiClientNamedPipe. • http://www.securityfocus.com/bid/101682 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2015-7362
https://notcve.org/view.php?id=CVE-2015-7362
08 Jan 2016 — Fortinet FortiClient Linux SSLVPN before build 2313, when installed on Linux in a home directory that is world readable and executable, allows local users to gain privileges via the helper/subroc setuid program. Fortinet FortiClient Linux SSLVPN en versiones anteriores a build 2313, cuando se instala en Linux en un directorio home que es accesible para lectura y ejecutable por cualquiera, permite a usuarios locales obtener privilegios a través del programa helper/subroc setuid. • http://fortiguard.com/advisory/forticlient-sslvpn-linux-client-local-privilege-escalation-vulnerability • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2015-5735 – FortiClient Antivirus Information Exposure / Access Control
https://notcve.org/view.php?id=CVE-2015-5735
02 Sep 2015 — The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, and (4) mdare64_52.sys drivers in Fortinet FortiClient before 5.2.4 allow local users to write to arbitrary memory locations via a 0x226108 ioctl call. Los controladores (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys y (4) mdare64_52.sys en Fortinet FortiClient en versiones anteriores a 5.2.4 permite a usuarios locales escribir a localizaciones de memoria arbitrarias a través de una llamada ioctl 0x226108. FortiClient drivers are pr... • http://fortiguard.com/advisory/mulitple-vulnerabilities-in-forticlient • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2015-5736 – Fortinet FortiClient 5.2.3 (Windows 10 x64 Creators) - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2015-5736
02 Sep 2015 — The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call. Vulnerabilidad en el driver Fortishield.sys en Fortinet FortiClient en versiones anteriores a 5.2.4, permite a usuarios locales ejecutar código arbitrario con privilegios de kernel mediante el establecimiento de la función callback en llamada ioctl en (1) 0x220024 o (2) 0x220028. FortiClient drivers ... • https://packetstorm.news/files/id/148811 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2015-5737 – FortiClient Antivirus Information Exposure / Access Control
https://notcve.org/view.php?id=CVE-2015-5737
02 Sep 2015 — The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, (4) mdare64_52.sys, and (5) Fortishield.sys drivers in Fortinet FortiClient before 5.2.4 do not properly restrict access to the API for management of processes and the Windows registry, which allows local users to obtain a privileged handle to a PID and possibly have unspecified other impact, as demonstrated by a 0x2220c8 ioctl call. Vulnerabilidad en los drivers (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, (4) mdare64_52.sys y (... • http://fortiguard.com/advisory/mulitple-vulnerabilities-in-forticlient • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2015-4077 – Fortinet FortiClient 5.2.3 (Windows 10 x64 Creators) - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2015-4077
02 Sep 2015 — The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, and (4) mdare64_52.sys drivers in Fortinet FortiClient before 5.2.4 allow local users to read arbitrary kernel memory via a 0x22608C ioctl call. Los controladores (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys y (4) mdare64_52.sys en Fortinet FortiClient en versiones anteriores a 5.2.4 permiten a usuarios locales leer memoria del kernel arbitraria a través de una llamada ioctl 0x22608C. FortiClient drivers are prone to multiple atta... • https://packetstorm.news/files/id/148811 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •