CVE-2023-45590

An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*
cpe:2.3:a:fortinet:forticlient:7.0.3:*:*:*:*:linux:*:*
cpe:2.3:a:fortinet:forticlient:7.0.4:*:*:*:*:linux:*:*
cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:linux:*:*

History

17 Jan 2025, 17:08

Type Values Removed Values Added
References () https://fortiguard.com/psirt/FG-IR-23-087 - () https://fortiguard.com/psirt/FG-IR-23-087 - Vendor Advisory
CPE cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*
cpe:2.3:a:fortinet:forticlient:7.0.3:*:*:*:*:linux:*:*
cpe:2.3:a:fortinet:forticlient:7.0.4:*:*:*:*:linux:*:*
cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:linux:*:*
First Time Fortinet
Fortinet forticlient

Information

Published : 2024-04-09 15:15

Updated : 2025-01-17 17:08


NVD link : CVE-2023-45590

Mitre link : CVE-2023-45590

CVE.ORG link : CVE-2023-45590


JSON object : View

Products Affected

fortinet

  • forticlient
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')