6.7
CVE-2024-40586
- EPSS 0.02%
- Published 11.02.2025 17:15:22
- Last modified 16.07.2025 15:11:18
- Source psirt@fortinet.com
- Teams watchlist Login
- Open Login
An Improper Access Control vulnerability [CWE-284] in FortiClient Windows version 7.4.0, version 7.2.6 and below, version 7.0.13 and below may allow a local user to escalate his privileges via FortiSSLVPNd service pipe.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Fortinet ≫ FortiClient SwPlatformwindows Version >= 7.0.3 < 7.0.14
Fortinet ≫ FortiClient SwPlatformwindows Version >= 7.2.0 < 7.2.7
Fortinet ≫ FortiClient Version7.4.0 SwPlatformwindows
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.042 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
psirt@fortinet.com | 6.7 | 0.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-284 Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.