The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of FortiClient

vulnerability announce CVE-2019-6692

FortiClient for Windows: denial of service

Synthesis of the vulnerability

An attacker can trigger a fatal error of FortiClient for Windows, in order to trigger a denial of service.
Impacted products: FortiClient.
Severity: 1/4.
Consequences: denial of service on service, denial of service on client.
Provenance: privileged shell.
Creation date: 26/07/2019.
Identifiers: CERTFR-2019-AVI-359, CVE-2019-6692, FG-IR-19-148, VIGILANCE-VUL-29892.

Description of the vulnerability

An attacker can trigger a fatal error of FortiClient for Windows, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2019-5589

Fortinet FortiClient: executing DLL code

Synthesis of the vulnerability

An attacker can create a malicious DLL, and then put it in the current directory of Fortinet FortiClient, in order to execute code.
Impacted products: FortiClient.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: intranet server.
Creation date: 16/05/2019.
Identifiers: CERTFR-2019-AVI-227, CVE-2019-5589, FG-IR-19-060, VIGILANCE-VUL-29347.

Description of the vulnerability

The Fortinet FortiClient product uses external shared libraries (DLL).

However, if the working directory contains a malicious DLL, it is automatically loaded.

An attacker can therefore create a malicious DLL, and then put it in the current directory of Fortinet FortiClient, in order to execute code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin 29118

FortiClient: information disclosure via Session Cookies Reading

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Session Cookies Reading of FortiClient, in order to obtain sensitive information.
Impacted products: FortiClient.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 24/04/2019.
Identifiers: FG-IR-19-110, VIGILANCE-VUL-29118, VU#192371.

Description of the vulnerability

An attacker can bypass access restrictions to data via Session Cookies Reading of FortiClient, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2019-5585

Fortinet FortiClient Mac: denial of service

Synthesis of the vulnerability

An attacker can trigger a fatal error of Fortinet FortiClient Mac, in order to trigger a denial of service.
Impacted products: FortiClient.
Severity: 1/4.
Consequences: denial of service on client.
Provenance: user shell.
Creation date: 02/04/2019.
Identifiers: CERTFR-2019-AVI-140, CVE-2019-5585, FG-IR-19-003, VIGILANCE-VUL-28920.

Description of the vulnerability

An attacker can trigger a fatal error of Fortinet FortiClient Mac, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2018-9190

FortiClientWindows: NULL pointer dereference via NDIS Miniport drivers

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced via NDIS Miniport drivers of FortiClientWindows, in order to trigger a denial of service.
Impacted products: FortiClient.
Severity: 1/4.
Consequences: denial of service on server.
Provenance: document.
Creation date: 11/01/2019.
Identifiers: CERTFR-2019-AVI-017, CVE-2018-9190, FG-IR-18-092, VIGILANCE-VUL-28248.

Description of the vulnerability

An attacker can force a NULL pointer to be dereferenced via NDIS Miniport drivers of FortiClientWindows, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2018-13368 CVE-2018-9191 CVE-2018-9193

FortiClient: privilege escalation via Windows Vulnerability Scan

Synthesis of the vulnerability

An attacker can bypass restrictions via Windows Vulnerability Scan of FortiClient, in order to escalate his privileges.
Impacted products: FortiClient.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 3.
Creation date: 27/12/2018.
Identifiers: CERTFR-2018-AVI-611, CVE-2018-13368, CVE-2018-9191, CVE-2018-9193, FG-IR-18-108, VIGILANCE-VUL-28107.

Description of the vulnerability

An attacker can bypass restrictions via Windows Vulnerability Scan of FortiClient, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2017-7344

FortiClient Windows: privilege escalation via VPN Before Logon

Synthesis of the vulnerability

An attacker can bypass restrictions via VPN Before Logon of FortiClient Windows, in order to escalate his privileges.
Impacted products: FortiClient.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: physical access.
Creation date: 13/12/2017.
Identifiers: CERTFR-2017-AVI-471, CVE-2017-7344, FG-IR-17-070, VIGILANCE-VUL-24761.

Description of the vulnerability

An attacker can bypass restrictions via VPN Before Logon of FortiClient Windows, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2017-14184 CVE-2017-17543

FortiClient: privilege escalation via VPN Credentials

Synthesis of the vulnerability

An attacker can bypass restrictions via VPN Credentials of FortiClient, in order to escalate his privileges.
Impacted products: FortiClient.
Severity: 2/4.
Consequences: user access/rights, data reading.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 2.
Creation date: 08/12/2017.
Identifiers: CERTFR-2017-AVI-453, CVE-2017-14184, CVE-2017-17543, FG-IR-17-214, SEC Consult SA-20171213-0, VIGILANCE-VUL-24707.

Description of the vulnerability

An attacker can bypass restrictions via VPN Credentials of FortiClient, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability note 24314

FortiClient: privilege escalation via FortiClientNamedPipe

Synthesis of the vulnerability

An attacker can bypass restrictions via FortiClientNamedPipe of FortiClient, in order to escalate his privileges.
Impacted products: FortiClient.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 02/11/2017.
Identifiers: CERTFR-2017-AVI-387, CVE-2016-8493-REJECTERROR, FG-IR-16-095, VIGILANCE-VUL-24314.

Description of the vulnerability

An attacker can bypass restrictions via FortiClientNamedPipe of FortiClient, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert 22341

Fortinet FortiClient: privilege escalation via subproc

Synthesis of the vulnerability

An attacker can bypass restrictions via subproc of Fortinet FortiClient, in order to escalate his privileges.
Impacted products: FortiClient, FortiOS.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 05/04/2017.
Identifiers: CVE-2016-8497-REJECTERROR, FG-IR-16-013, FG-IR-16-041, VIGILANCE-VUL-22341.

Description of the vulnerability

An attacker can bypass restrictions via subproc of Fortinet FortiClient, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about FortiClient: