A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-199 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Jan 2025, 22:21
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fortinet
Fortinet forticlient |
|
CWE | CWE-306 | |
CPE | cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:* cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* |
|
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-199 - Vendor Advisory |
Information
Published : 2024-11-13 12:15
Updated : 2025-01-21 22:21
NVD link : CVE-2024-47574
Mitre link : CVE-2024-47574
CVE.ORG link : CVE-2024-47574
JSON object : View
Products Affected
fortinet
- forticlient