7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
7 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
The fortimon.sys device driver in Fortinet FortiClient Host Security 3.0 MR5 Patch 3 and earlier does not properly initialize its DeviceExtension, which allows local users to access kernel memory and execute arbitrary code via a crafted request.
CPE | Name | Operator | Version |
---|---|---|---|
fortinet:forticlient_host_security | fortinet forticlient host security | le | 3.0 |
kc.forticare.com/default.asp?id=3618
secunia.com/advisories/28975
securityreason.com/securityalert/3660
www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=47&Itemid=15
www.securityfocus.com/archive/1/488071/100/0/threaded
www.securityfocus.com/bid/27776
www.securitytracker.com/id?1019415
www.vupen.com/english/advisories/2008/0541/references
exchange.xforce.ibmcloud.com/vulnerabilities/40512