Lucene search

K

67 matches found

CVE
CVE
added 2024/05/06 7:15 p.m.269 views

CVE-2024-3661

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify ne...

7.6CVSS7.3AI score0.01876EPSS
CVE
CVE
added 2019/05/28 10:29 p.m.112 views

CVE-2019-5589

An Unsafe Search Path vulnerability in FortiClient Online Installer (Windows version before 6.0.6) may allow an unauthenticated, remote attacker with control over the directory in which FortiClientOnlineInstaller.exe resides to execute arbitrary code on the system via uploading malicious .dll files...

9.3CVSS7.9AI score0.0062EPSS
CVE
CVE
added 2019/11/21 3:15 p.m.101 views

CVE-2018-9195

Use of a hardcoded cryptographic key in the FortiGuard services communication protocol may allow a Man in the middle with knowledge of the key to eavesdrop on and modify information (URL/SPAM services in FortiOS 5.6, and URL/SPAM/AV services in FortiOS 6.0.; URL rating in FortiClient) sent and rece...

5.9CVSS5.5AI score0.00297EPSS
CVE
CVE
added 2022/04/06 10:15 a.m.101 views

CVE-2021-44169

A improper initialization in Fortinet FortiClient (Windows) version 6.0.10 and below, version 6.2.9 and below, version 6.4.7 and below, version 7.0.3 and below allows attacker to gain administrative privileges via placing a malicious executable inside the FortiClient installer's directory.

8.8CVSS8.7AI score0.00131EPSS
CVE
CVE
added 2023/04/11 5:15 p.m.84 views

CVE-2022-43946

Multiple vulnerabilities including an incorrect permission assignment for critical resource [CWE-732] vulnerability and a time-of-check time-of-use (TOCTOU) race condition [CWE-367] vulnerability in Fortinet FortiClientWindows before 7.0.7 allows attackers on the same file sharing network to execut...

8.1CVSS8.3AI score0.00137EPSS
CVE
CVE
added 2022/07/18 6:15 p.m.83 views

CVE-2021-41031

A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service.

7.8CVSS7.5AI score0.00129EPSS
CVE
CVE
added 2022/04/06 4:15 p.m.79 views

CVE-2021-22127

An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient for Linux 6.2.x before 6.2.9 may allow an unauthenticated attacker to execute arbitrary code on the host operating system as root via tricking the user into connecting to a network with a malicious n...

8CVSS8.1AI score0.00311EPSS
CVE
CVE
added 2023/04/11 5:15 p.m.79 views

CVE-2022-40682

A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe.

7.8CVSS7.7AI score0.00049EPSS
CVE
CVE
added 2022/07/19 2:15 p.m.78 views

CVE-2022-26113

An execution with unnecessary privileges vulnerability [CWE-250] in FortiClientWindows 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.10 may allow a local attacker to perform an arbitrary file write on the system.

7.7CVSS6.8AI score0.00104EPSS
CVE
CVE
added 2020/03/12 10:15 p.m.73 views

CVE-2019-17658

An unquoted service path vulnerability in the FortiClient FortiTray component of FortiClientWindows v6.2.2 and prior allow an attacker to gain elevated privileges via the FortiClientConsole executable service path.

9.8CVSS9.5AI score0.00391EPSS
CVE
CVE
added 2022/04/06 10:15 a.m.72 views

CVE-2021-43205

An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient for Linux version 7.0.2 and below, 6.4.7 and below and 6.2.9 and below may allow an unauthenticated attacker to access the confighandler webserver via external binaries.

5.3CVSS5.1AI score0.00255EPSS
CVE
CVE
added 2023/11/14 6:15 p.m.70 views

CVE-2023-33304

A use of hard-coded credentials vulnerability in Fortinet FortiClient Windows 7.0.0 - 7.0.9 and 7.2.0 - 7.2.1 allows an attacker to bypass system protections via the use of static credentials.

5.5CVSS5.4AI score0.00004EPSS
CVE
CVE
added 2020/06/01 7:15 p.m.69 views

CVE-2020-9291

An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.

7.8CVSS7.6AI score0.00107EPSS
CVE
CVE
added 2022/05/11 3:15 p.m.67 views

CVE-2021-44167

An incorrect permission assignment for critical resource vulnerability [CWE-732] in FortiClient for Linux version 6.0.8 and below, 6.2.9 and below, 6.4.7 and below, 7.0.2 and below may allow an unauthenticated attacker to access sensitive information in log files and directories via symbolic links.

7.5CVSS7.4AI score0.0024EPSS
CVE
CVE
added 2019/10/24 2:15 p.m.66 views

CVE-2019-6692

A malicious DLL preload vulnerability in Fortinet FortiClient for Windows 6.2.0 and below allows a privileged attacker to perform arbitrary code execution via forging that DLL.

7.8CVSS7.7AI score0.00137EPSS
CVE
CVE
added 2023/11/14 7:15 p.m.66 views

CVE-2022-40681

A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to cause denial of service via sending a crafted request to a specific named pipe.

7.1CVSS6.7AI score0.0005EPSS
CVE
CVE
added 2022/05/11 4:15 p.m.62 views

CVE-2021-43066

A external control of file name or path in Fortinet FortiClientWindows version 7.0.2 and below, version 6.4.6 and below, version 6.2.9 and below, version 6.0.10 and below allows attacker to escalate privilege via the MSI installer.

8.4CVSS7.8AI score0.00058EPSS
CVE
CVE
added 2024/11/13 12:15 p.m.62 views

CVE-2024-47574

A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.

7.8CVSS8.1AI score0.00035EPSS
CVE
CVE
added 2024/12/19 11:15 a.m.60 views

CVE-2020-15934

An execution with unnecessary privileges vulnerability in the VCM engine of FortiClient for Linux versions 6.2.7 and below, version 6.4.0. may allow local users to elevate their privileges to root by creating a malicious script or program on the target machine.

8.8CVSS8.4AI score0.00028EPSS
CVE
CVE
added 2024/09/10 3:15 p.m.60 views

CVE-2024-31489

AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote and unauthenticated attacker to perform a Man-in-...

8.1CVSS7.1AI score0.00064EPSS
CVE
CVE
added 2017/12/15 9:29 p.m.59 views

CVE-2017-14184

An Information Disclosure vulnerability in Fortinet FortiClient for Windows 5.6.0 and below versions, FortiClient for Mac OSX 5.6.0 and below versions and FortiClient SSLVPN Client for Linux 4.4.2334 and below versions allows regular users to see each other's VPN authentication credentials due to i...

8.8CVSS8.5AI score0.00448EPSS
CVE
CVE
added 2025/05/28 8:15 a.m.59 views

CVE-2025-25251

An Incorrect Authorization vulnerability [CWE-863] in FortiClient Mac 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 may allow a local attacker to escalate privileges via crafted XPC messages.

7.8CVSS7.7AI score0.00016EPSS
CVE
CVE
added 2015/09/03 2:59 p.m.57 views

CVE-2015-4077

The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, and (4) mdare64_52.sys drivers in Fortinet FortiClient before 5.2.4 allow local users to read arbitrary kernel memory via a 0x22608C ioctl call.

2.1CVSS6.2AI score0.00559EPSS
CVE
CVE
added 2017/12/14 6:29 p.m.56 views

CVE-2017-7344

A privilege escalation in Fortinet FortiClient Windows 5.4.3 and earlier as well as 5.6.0 allows attacker to gain privilege via exploiting the Windows "security alert" dialog thereby popping up when the "VPN before logon" feature is enabled and an untrusted certificate chain.

8.1CVSS8.3AI score0.01272EPSS
CVE
CVE
added 2021/12/01 12:15 p.m.56 views

CVE-2021-32592

An unsafe search path vulnerability in FortiClientWindows 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x and FortiClientEMS 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x may allow an attacker to perform a DLL Hijack attack on affected devices via a malicious OpenSSL engine library in the search path.

7.8CVSS7.4AI score0.00052EPSS
CVE
CVE
added 2021/12/16 7:15 p.m.56 views

CVE-2021-41028

A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an u...

8.2CVSS7.4AI score0.00032EPSS
CVE
CVE
added 2024/04/09 3:15 p.m.56 views

CVE-2023-45590

An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website

9.6CVSS9.4AI score0.00732EPSS
CVE
CVE
added 2022/11/02 12:15 p.m.55 views

CVE-2022-33878

An exposure of sensitive information to an unauthorized actor vulnerabiltiy [CWE-200] in FortiClient for Mac versions 7.0.0 through 7.0.5 may allow a local authenticated attacker to obtain the SSL-VPN password in cleartext via running a logstream for the FortiTray process in the terminal.

5.5CVSS5.2AI score0.00052EPSS
CVE
CVE
added 2013/06/25 2:38 p.m.54 views

CVE-2013-4669

FortiClient before 4.3.5.472 on Windows, before 4.0.3.134 on Mac OS X, and before 4.0 on Android; FortiClient Lite before 4.3.4.461 on Windows; FortiClient Lite 2.0 through 2.0.0223 on Android; and FortiClient SSL VPN before 4.0.2258 on Linux proceed with an SSL session after determining that the s...

5.4CVSS6.3AI score0.0013EPSS
CVE
CVE
added 2023/04/11 5:15 p.m.54 views

CVE-2023-22635

A download of code without Integrity check vulnerability [CWE-494] in FortiClientMac version 7.0.0 through 7.0.7, 6.4 all versions, 6.2 all versions, 6.0 all versions, 5.6 all versions, 5.4 all versions, 5.2 all versions, 5.0 all versions and 4.0 all versions may allow a local attacker to escalate ...

7.8CVSS7.7AI score0.0004EPSS
CVE
CVE
added 2019/05/30 5:29 p.m.52 views

CVE-2018-9193

A researcher has disclosed several vulnerabilities against FortiClient for Windows version 6.0.5 and below, version 5.6.6, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows.

7.8CVSS8AI score0.00058EPSS
CVE
CVE
added 2020/03/15 10:15 p.m.52 views

CVE-2020-9290

An Unsafe Search Path vulnerability in FortiClient for Windows online installer 6.2.3 and below may allow a local attacker with control over the directory in which FortiClientOnlineInstaller.exe and FortiClientVPNOnlineInstaller.exe resides to execute arbitrary code on the system via uploading mali...

7.8CVSS7.8AI score0.00049EPSS
CVE
CVE
added 2024/11/12 7:15 p.m.50 views

CVE-2024-36507

A untrusted search path in Fortinet FortiClientWindows versions 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0 allows an attacker to run arbitrary code via DLL hijacking and social engineering.

7.8CVSS7.4AI score0.00024EPSS
CVE
CVE
added 2025/02/11 5:15 p.m.50 views

CVE-2024-40586

An Improper Access Control vulnerability [CWE-284] in FortiClient Windows version 7.4.0, version 7.2.6 and below, version 7.0.13 and below may allow a local user to escalate his privileges via FortiSSLVPNd service pipe.

6.7CVSS6.5AI score0.00019EPSS
CVE
CVE
added 2025/01/14 2:15 p.m.50 views

CVE-2024-50564

A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.

3.3CVSS3.9AI score0.00021EPSS
CVE
CVE
added 2015/09/03 2:59 p.m.49 views

CVE-2015-5735

The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, and (4) mdare64_52.sys drivers in Fortinet FortiClient before 5.2.4 allow local users to write to arbitrary memory locations via a 0x226108 ioctl call.

7.2CVSS6.6AI score0.00061EPSS
CVE
CVE
added 2021/07/12 1:15 p.m.49 views

CVE-2021-26089

An improper symlink following in FortiClient for Mac 6.4.3 and below may allow an non-privileged user to execute arbitrary privileged shell commands during installation phase.

7.8CVSS7.9AI score0.00093EPSS
CVE
CVE
added 2023/06/13 9:15 a.m.49 views

CVE-2022-33877

An incorrect default permission [CWE-276] vulnerability in FortiClient (Windows) versions 7.0.0 through 7.0.6 and 6.4.0 through 6.4.8 and FortiConverter (Windows) versions 6.2.0 through 6.2.1, 7.0.0 and all versions of 6.0.0 may allow a local authenticated attacker to tamper with files in the insta...

7CVSS5.2AI score0.00034EPSS
CVE
CVE
added 2024/09/10 3:15 p.m.49 views

CVE-2022-45856

An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientAndroid 6.4 all versio...

5.9CVSS7.1AI score0.00071EPSS
CVE
CVE
added 2024/04/10 1:51 p.m.47 views

CVE-2024-31492

An external control of file name or path vulnerability [CWE-73] in FortiClientMac version 7.2.3 and below, version 7.0.10 and below installer may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file in /tmp before starting the installation process.

8.2CVSS9.2AI score0.0008EPSS
CVE
CVE
added 2019/11/21 3:15 p.m.46 views

CVE-2019-15704

A clear text storage of sensitive information vulnerability in FortiClient for Mac may allow a local attacker to read sensitive information logged in the console window when the user connects to an SSL VPN Gateway.

5.5CVSS5.1AI score0.00025EPSS
CVE
CVE
added 2020/06/04 1:15 p.m.46 views

CVE-2019-16150

Use of a hard-coded cryptographic key to encrypt security sensitive data in local storage and configuration in FortiClient for Windows prior to 6.4.0 may allow an attacker with access to the local storage or the configuration backup file to decrypt the sensitive data via knowledge of the hard-coded...

5.5CVSS5.4AI score0.00214EPSS
CVE
CVE
added 2024/09/10 3:15 p.m.46 views

CVE-2024-35282

A cleartext storage of sensitive information in memory vulnerability [CWE-316] affecting FortiClient VPN iOS 7.2 all versions, 7.0 all versions, 6.4 all versions, 6.2 all versions, 6.0 all versions may allow an unauthenticated attacker that has physical access to a jailbroken device to obtain clear...

4.6CVSS6AI score0.00041EPSS
CVE
CVE
added 2019/11/21 4:15 p.m.45 views

CVE-2019-17650

An Improper Neutralization of Special Elements used in a Command vulnerability in one of FortiClient for Mac OS root processes, may allow a local user of the system on which FortiClient is running to execute unauthorized code as root by bypassing a security check.

7.8CVSS7.7AI score0.00119EPSS
CVE
CVE
added 2023/10/10 5:15 p.m.45 views

CVE-2023-37939

An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient for Windows 7.2.0, 7.0 all versions, 6.4 all versions, 6.2 all versions, Linux 7.2.0, 7.0 all versions, 6.4 all versions, 6.2 all versions and Mac 7.2.0 through 7.2.1, 7.0 all versions, 6.4 all vers...

3.3CVSS3.8AI score0.00051EPSS
CVE
CVE
added 2024/11/12 7:15 p.m.44 views

CVE-2024-40592

An improper verification of cryptographic signature vulnerability [CWE-347] in FortiClient MacOS version 7.4.0, version 7.2.4 and below, version 7.0.10 and below, version 6.4.10 and below may allow a local authenticated attacker to swap the installer with a malicious package via a race condition du...

7.5CVSS6.6AI score0.00012EPSS
CVE
CVE
added 2015/09/03 2:59 p.m.43 views

CVE-2015-5736

The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call.

7.2CVSS7.1AI score0.0248EPSS
CVE
CVE
added 2020/02/06 4:15 p.m.43 views

CVE-2019-16152

A Denial of service (DoS) vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to cause FortiClient processes running under root privilege crashes via sending specially crafted IPC client requests to the fctsched process due the nanomsg not been correctly vali...

6.8CVSS6.6AI score0.00352EPSS
CVE
CVE
added 2021/11/02 7:15 p.m.43 views

CVE-2021-36183

An improper authorization vulnerability [CWE-285] in FortiClient for Windows versions 7.0.1 and below and 6.4.2 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for Forticlient updates.

7.8CVSS7.6AI score0.00136EPSS
CVE
CVE
added 2025/05/28 8:15 a.m.43 views

CVE-2025-24473

A exposure of sensitive system information to an unauthorized control sphere in Fortinet FortiClientWindows versions 7.2.0 through 7.2.1 may allow an unauthorized remote attacker to view application information via navigation to a hosted webpage, if Windows is configured to accept incoming connecti...

3.7CVSS6.6AI score0.00053EPSS
Total number of security vulnerabilities67