A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-199 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Jan 2025, 22:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:* cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* |
|
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-199 - Vendor Advisory | |
First Time |
Fortinet
Fortinet forticlient |
|
Summary |
|
|
CWE | CWE-306 |
13 Nov 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-13 12:15
Updated : 2025-01-21 22:21
NVD link : CVE-2024-47574
Mitre link : CVE-2024-47574
CVE.ORG link : CVE-2024-47574
JSON object : View
Products Affected
fortinet
- forticlient