Fortinet

FortiClient

84 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 13.11.2024 12:15:16
  • Zuletzt bearbeitet 21.01.2025 22:21:03

A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code wit...

  • EPSS 0.03%
  • Veröffentlicht 12.11.2024 19:15:11
  • Zuletzt bearbeitet 14.11.2024 20:37:06

An improper verification of cryptographic signature vulnerability [CWE-347] in FortiClient MacOS version 7.4.0, version 7.2.4 and below, version 7.0.10 and below, version 6.4.10 and below may allow a local authenticated attacker to swap the installer...

  • EPSS 0.17%
  • Veröffentlicht 12.11.2024 19:15:10
  • Zuletzt bearbeitet 14.11.2024 20:35:26

A privilege context switching error vulnerability [CWE-270] in FortiClient Windows version 7.2.4 and below, version 7.0.12 and below, 6.4 all versions may allow an authenticated user to escalate their privileges via lua auto patch scripts.

  • EPSS 0.09%
  • Veröffentlicht 12.11.2024 19:15:10
  • Zuletzt bearbeitet 14.11.2024 20:31:45

A untrusted search path in Fortinet FortiClientWindows versions 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0 allows an attacker to run arbitrary code via DLL hijacking and social engineering.

  • EPSS 0.17%
  • Veröffentlicht 10.09.2024 15:15:16
  • Zuletzt bearbeitet 20.09.2024 19:44:17

A cleartext storage of sensitive information in memory vulnerability [CWE-316] affecting FortiClient VPN iOS 7.2 all versions, 7.0 all versions, 6.4 all versions, 6.2 all versions, 6.0 all versions may allow an unauthenticated attacker that has physi...

  • EPSS 0.25%
  • Veröffentlicht 10.09.2024 15:15:15
  • Zuletzt bearbeitet 20.09.2024 19:41:19

AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote...

  • EPSS 0.18%
  • Veröffentlicht 10.09.2024 15:15:13
  • Zuletzt bearbeitet 26.09.2024 14:48:14

An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0...

Medienbericht Exploit
  • EPSS 2.91%
  • Veröffentlicht 06.05.2024 19:15:11
  • Zuletzt bearbeitet 15.01.2025 16:50:28

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local...

  • EPSS 0.11%
  • Veröffentlicht 10.04.2024 13:51:38
  • Zuletzt bearbeitet 23.01.2025 15:58:57

An external control of file name or path vulnerability [CWE-73] in FortiClientMac version 7.2.3 and below, version 7.0.10 and below installer may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file...

  • EPSS 0.77%
  • Veröffentlicht 09.04.2024 15:15:27
  • Zuletzt bearbeitet 17.01.2025 17:08:31

An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into v...