28 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

A download of code without Integrity check vulnerability [CWE-494] in FortiClientMac version 7.0.0 through 7.0.7, 6.4 all versions, 6.2 all versions, 6.0 all versions, 5.6 all versions, 5.4 all versions, 5.2 all versions, 5.0 all versions and 4.0 all versions may allow a local attacker to escalate their privileges via modifying the installer upon upgrade. • https://fortiguard.com/psirt/FG-IR-22-481 • CWE-494: Download of Code Without Integrity Check •

CVSS: 8.0EPSS: 0%CPEs: 2EXPL: 0

An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient for Linux 6.2.x before 6.2.9 may allow an unauthenticated attacker to execute arbitrary code on the host operating system as root via tricking the user into connecting to a network with a malicious name. Una vulnerabilidad de comprobación de entrada inapropiada en FortiClient para Linux versiones 6.4.x anteriores a 6.4.3, FortiClient para Linux versiones 6.2.x anteriores a 6.2.9, puede permitir que un atacante no autenticado ejecute código arbitrario en el sistema operativo anfitrión como root por medio de engañar al usuario para que sea conectado a una red con un nombre malicioso • https://fortiguard.com/advisory/FG-IR-20-241 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 4.9EPSS: 0%CPEs: 36EXPL: 0

A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions. Un control inapropiado de un recurso a lo largo de su vida en Fortinet FortiClientWindows versión 6.4.1 y 6.4.0, versión 6.2.9 y anteriores, versión 6.0.10 y anteriores, permite a un atacante causar una denegación de servicio completa de sus componentes por medio de cambios en los permisos de acceso al directorio • https://fortiguard.com/advisory/FG-IR-21-167 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

An improper symlink following in FortiClient for Mac 6.4.3 and below may allow an non-privileged user to execute arbitrary privileged shell commands during installation phase. Un seguimiento inapropiado de los enlaces simbólicos en FortiClient para Mac versiones 6.4.3 y por debajo, puede permitir a un usuario no privilegiado ejecutar comandos de shell con privilegios arbitrarios durante la fase de instalación This vulnerability allows local attackers to escalate privileges on affected installations of Fortinet FortiClient on Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the FortiClient installer. The issue lies in the lack of proper permissions set on log files created by the installer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. • https://fortiguard.com/advisory/FG-IR-21-022 https://www.zerodayinitiative.com/advisories/ZDI-22-078 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Use of a hard-coded cryptographic key to encrypt security sensitive data in local storage and configuration in FortiClient for Windows prior to 6.4.0 may allow an attacker with access to the local storage or the configuration backup file to decrypt the sensitive data via knowledge of the hard-coded key. El uso de una clave criptográfica embebida para cifrar datos confidenciales de seguridad en el almacenamiento local y la configuración en FortiClient para Windows versiones anteriores a 6.4.0, puede permitir a un atacante con acceso al almacenamiento local o al archivo de copia de seguridad de la configuración descifrar los datos confidenciales mediante el conocimiento de la clave embebida • https://fortiguard.com/psirt/FG-IR-19-194 • CWE-798: Use of Hard-coded Credentials •