9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.2%
An improper control of generation of code (‘code injection’) in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website
[
{
"vendor": "Fortinet",
"product": "FortiClientLinux",
"defaultStatus": "unaffected",
"versions": [
{
"version": "7.2.0",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.0.6",
"lessThanOrEqual": "7.0.10",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.0.3",
"lessThanOrEqual": "7.0.4",
"status": "affected"
}
]
}
]
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.2%