An improper verification of source of a communication channel vulnerability [CWE-940] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, 6.4 all versions may allow a remote attacker to bypass the trusted host feature via session connection.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-078 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
31 Jan 2025, 17:10
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fortinet:forticlientems:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientems_cloud:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientems:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientems_cloud:*:*:*:*:*:*:*:* |
|
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-078 - Vendor Advisory | |
CWE | NVD-CWE-Other | |
First Time |
Fortinet forticlientems
Fortinet Fortinet forticlientems Cloud |
|
Summary |
|
14 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-14 14:15
Updated : 2025-01-31 17:10
NVD link : CVE-2024-36506
Mitre link : CVE-2024-36506
CVE.ORG link : CVE-2024-36506
JSON object : View
Products Affected
fortinet
- forticlientems
- forticlientems_cloud
CWE