// For flags

CVE-2013-4669

 

Severity Score

5.9
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

FortiClient before 4.3.5.472 on Windows, before 4.0.3.134 on Mac OS X, and before 4.0 on Android; FortiClient Lite before 4.3.4.461 on Windows; FortiClient Lite 2.0 through 2.0.0223 on Android; and FortiClient SSL VPN before 4.0.2258 on Linux proceed with an SSL session after determining that the server's X.509 certificate is invalid, which allows man-in-the-middle attackers to obtain sensitive information by leveraging a password transmission that occurs before the user warning about the certificate problem.

FortiClient antes de v4.3.5.472 en Windows, antes v4.0.3.134 en Mac OS X, y antes en Android v4.0, FortiClient Lite antes de v4.3.4.461 para Windows, FortiClient Lite v2.0 hasta v2.0.0223 en Android, y FortiClient SSL VPN antes de v4.0.2258 en Linux continua con una sesión de SSL después de determinar que el certificado X.509 del servidor no es válido, lo que permite a atacantes man-in-the-middle obtener información sensible mediante el aprovechamiento de una transmisión con contraseña que se produce antes de la advertencia usuario sobre el problema de certificado.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Complete
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-06-24 CVE Reserved
  • 2013-06-25 CVE Published
  • 2024-09-17 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-255: Credentials Management Errors
  • CWE-310: Cryptographic Issues
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Fortinet
Search vendor "Fortinet"
Forticlient
Search vendor "Fortinet" for product "Forticlient"
<= 4.3.3.445
Search vendor "Fortinet" for product "Forticlient" and version " <= 4.3.3.445"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Fortinet
Search vendor "Fortinet"
Forticlient Lite
Search vendor "Fortinet" for product "Forticlient Lite"
<= 4.3.3.445
Search vendor "Fortinet" for product "Forticlient Lite" and version " <= 4.3.3.445"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Fortinet
Search vendor "Fortinet"
Forticlient Ssl Vpn
Search vendor "Fortinet" for product "Forticlient Ssl Vpn"
<= 4.0.2012
Search vendor "Fortinet" for product "Forticlient Ssl Vpn" and version " <= 4.0.2012"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Fortinet
Search vendor "Fortinet"
Forticlient
Search vendor "Fortinet" for product "Forticlient"
<= 4.0.2
Search vendor "Fortinet" for product "Forticlient" and version " <= 4.0.2"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Fortinet
Search vendor "Fortinet"
Forticlient Lite
Search vendor "Fortinet" for product "Forticlient Lite"
<= 2.0
Search vendor "Fortinet" for product "Forticlient Lite" and version " <= 2.0"
-
Affected
in Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
*-
Safe