CVE-2015-1570
- EPSS 0.13%
- Veröffentlicht 10.02.2015 20:59:05
- Zuletzt bearbeitet 06.05.2026 22:30:45
The Endpoint Control protocol implementation in Fortinet FortiClient 5.2.3.091 for Android and 5.2.028 for iOS does not validate certificates, which makes it easier for man-in-the-middle attackers to spoof servers via a crafted certificate.
CVE-2015-1569
- EPSS 0.13%
- Veröffentlicht 10.02.2015 20:59:04
- Zuletzt bearbeitet 06.05.2026 22:30:45
Fortinet FortiClient 5.2.028 for iOS does not validate certificates, which makes it easier for man-in-the-middle attackers to spoof SSL VPN servers via a crafted certificate.
- EPSS 0.16%
- Veröffentlicht 02.02.2015 16:59:06
- Zuletzt bearbeitet 06.05.2026 22:30:45
The qm class in Fortinet FortiClient 5.2.3.091 for Android uses a hardcoded encryption key of FoRtInEt!AnDrOiD, which makes it easier for attackers to obtain passwords and possibly other sensitive data by leveraging the key to decrypt data in the Sha...
CVE-2013-4669
- EPSS 0.19%
- Veröffentlicht 25.06.2013 14:38:18
- Zuletzt bearbeitet 29.04.2026 01:13:23
FortiClient before 4.3.5.472 on Windows, before 4.0.3.134 on Mac OS X, and before 4.0 on Android; FortiClient Lite before 4.3.4.461 on Windows; FortiClient Lite 2.0 through 2.0.0223 on Android; and FortiClient SSL VPN before 4.0.2258 on Linux proceed...