Lucene search

K
zdiTingZDI-23-1104
HistoryAug 14, 2023 - 12:00 a.m.

Fortinet FortiClient VPN Improper Access Control Remote Code Execution Vulnerability

2023-08-1400:00:00
Ting
www.zerodayinitiative.com
30
fortinet
forticlient
vpn
vulnerability
remote code execution
access control
authentication
daemon
access controls
sensitive pipe
remote attacker
system

0.001 Low

EPSS

Percentile

48.2%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fortinet FortiClient VPN. Authentication is required to exploit this vulnerability. The specific flaw exists within the FortiClient Logging daemon. The product applies insufficient access controls to a sensitive pipe. A remote attacker can leverage this vulnerability to execute code in the context of SYSTEM. Additionally, a local attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM.

0.001 Low

EPSS

Percentile

48.2%