CVE-2024-47574

A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*
cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:*

History

21 Jan 2025, 22:21

Type Values Removed Values Added
CPE cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:*
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*
References () https://fortiguard.fortinet.com/psirt/FG-IR-24-199 - () https://fortiguard.fortinet.com/psirt/FG-IR-24-199 - Vendor Advisory
First Time Fortinet
Fortinet forticlient
Summary
  • (es) Una omisión de autenticación que utiliza una ruta o canal alternativo en Fortinet FortiClientWindows versión 7.4.0, versiones 7.2.4 a 7.2.0, versiones 7.0.12 a 7.0.0 y 6.4.10 a 6.4.0 permite a un atacante con pocos privilegios ejecutar código arbitrario con altos privilegios a través de mensajes de canalización con nombre falsificados.
CWE CWE-306

13 Nov 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-13 12:15

Updated : 2025-01-21 22:21


NVD link : CVE-2024-47574

Mitre link : CVE-2024-47574

CVE.ORG link : CVE-2024-47574


JSON object : View

Products Affected

fortinet

  • forticlient
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel

CWE-306

Missing Authentication for Critical Function