An improper verification of cryptographic signature vulnerability [CWE-347] in FortiClient MacOS version 7.4.0, version 7.2.4 and below, version 7.0.10 and below, version 6.4.10 and below may allow a local authenticated attacker to swap the installer with a malicious package via a race condition during the installation process.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-022 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
14 Nov 2024, 20:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
CPE | cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:* cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:macos:*:* |
|
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-022 - Vendor Advisory | |
First Time |
Fortinet
Fortinet forticlient |
13 Nov 2024, 17:01
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
12 Nov 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-12 19:15
Updated : 2024-11-14 20:37
NVD link : CVE-2024-40592
Mitre link : CVE-2024-40592
CVE.ORG link : CVE-2024-40592
JSON object : View
Products Affected
fortinet
- forticlient
CWE
CWE-347
Improper Verification of Cryptographic Signature