The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of FortiClient

computer vulnerability bulletin 29118

FortiClient: information disclosure via Session Cookies Reading

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Session Cookies Reading of FortiClient, in order to obtain sensitive information.
Impacted products: FortiClient.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 24/04/2019.
Identifiers: FG-IR-19-110, VIGILANCE-VUL-29118, VU#192371.

Description of the vulnerability

An attacker can bypass access restrictions to data via Session Cookies Reading of FortiClient, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2019-5585

Fortinet FortiClient Mac: denial of service

Synthesis of the vulnerability

An attacker can trigger a fatal error of Fortinet FortiClient Mac, in order to trigger a denial of service.
Impacted products: FortiClient.
Severity: 1/4.
Consequences: denial of service on client.
Provenance: user shell.
Creation date: 02/04/2019.
Identifiers: CERTFR-2019-AVI-140, CVE-2019-5585, FG-IR-19-003, VIGILANCE-VUL-28920.

Description of the vulnerability

An attacker can trigger a fatal error of Fortinet FortiClient Mac, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2018-9190

FortiClientWindows: NULL pointer dereference via NDIS Miniport drivers

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced via NDIS Miniport drivers of FortiClientWindows, in order to trigger a denial of service.
Impacted products: FortiClient.
Severity: 1/4.
Consequences: denial of service on server.
Provenance: document.
Creation date: 11/01/2019.
Identifiers: CERTFR-2019-AVI-017, CVE-2018-9190, FG-IR-18-092, VIGILANCE-VUL-28248.

Description of the vulnerability

An attacker can force a NULL pointer to be dereferenced via NDIS Miniport drivers of FortiClientWindows, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce 28107

FortiClient: privilege escalation via Windows Vulnerability Scan

Synthesis of the vulnerability

An attacker can bypass restrictions via Windows Vulnerability Scan of FortiClient, in order to escalate his privileges.
Impacted products: FortiClient.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 27/12/2018.
Identifiers: CERTFR-2018-AVI-611, FG-IR-18-108, VIGILANCE-VUL-28107.

Description of the vulnerability

An attacker can bypass restrictions via Windows Vulnerability Scan of FortiClient, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2017-7344

FortiClient Windows: privilege escalation via VPN Before Logon

Synthesis of the vulnerability

An attacker can bypass restrictions via VPN Before Logon of FortiClient Windows, in order to escalate his privileges.
Impacted products: FortiClient.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: physical access.
Creation date: 13/12/2017.
Identifiers: CERTFR-2017-AVI-471, CVE-2017-7344, FG-IR-17-070, VIGILANCE-VUL-24761.

Description of the vulnerability

An attacker can bypass restrictions via VPN Before Logon of FortiClient Windows, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2017-14184 CVE-2017-17543

FortiClient: privilege escalation via VPN Credentials

Synthesis of the vulnerability

An attacker can bypass restrictions via VPN Credentials of FortiClient, in order to escalate his privileges.
Impacted products: FortiClient.
Severity: 2/4.
Consequences: user access/rights, data reading.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 2.
Creation date: 08/12/2017.
Identifiers: CERTFR-2017-AVI-453, CVE-2017-14184, CVE-2017-17543, FG-IR-17-214, SEC Consult SA-20171213-0, VIGILANCE-VUL-24707.

Description of the vulnerability

An attacker can bypass restrictions via VPN Credentials of FortiClient, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability note 24314

FortiClient: privilege escalation via FortiClientNamedPipe

Synthesis of the vulnerability

An attacker can bypass restrictions via FortiClientNamedPipe of FortiClient, in order to escalate his privileges.
Impacted products: FortiClient.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 02/11/2017.
Identifiers: CERTFR-2017-AVI-387, CVE-2016-8493-REJECTERROR, FG-IR-16-095, VIGILANCE-VUL-24314.

Description of the vulnerability

An attacker can bypass restrictions via FortiClientNamedPipe of FortiClient, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert 22341

Fortinet FortiClient: privilege escalation via subproc

Synthesis of the vulnerability

An attacker can bypass restrictions via subproc of Fortinet FortiClient, in order to escalate his privileges.
Impacted products: FortiClient, FortiOS.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 05/04/2017.
Identifiers: CVE-2016-8497-REJECTERROR, FG-IR-16-013, FG-IR-16-041, VIGILANCE-VUL-22341.

Description of the vulnerability

An attacker can bypass restrictions via subproc of Fortinet FortiClient, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability 22340

Fortinet FortiClient: file corruption via SSLVPN

Synthesis of the vulnerability

A local attacker can create a symbolic link named SSLVPN, in order to alter the pointed file, with privileges of Fortinet FortiClient.
Impacted products: FortiClient, FortiOS.
Severity: 1/4.
Consequences: data creation/edition.
Provenance: user shell.
Creation date: 05/04/2017.
Identifiers: CVE-2016-8496-REJECTERROR, FG-IR-16-069, VIGILANCE-VUL-22340.

Description of the vulnerability

A local attacker can create a symbolic link named SSLVPN, in order to alter the pointed file, with privileges of Fortinet FortiClient.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2015-4077 CVE-2015-5735 CVE-2015-5736

Fortinet FortiClient: four vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Fortinet FortiClient.
Impacted products: FortiClient.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading.
Provenance: user account.
Number of vulnerabilities in this bulletin: 4.
Creation date: 02/09/2015.
Revision date: 27/03/2017.
Identifiers: CORE-2015-0013, CVE-2015-4077, CVE-2015-5735, CVE-2015-5736, CVE-2015-5737, VIGILANCE-VUL-17788.

Description of the vulnerability

Several vulnerabilities were announced in Fortinet FortiClient.

An attacker can use the IOCTL 0x22608C of "mdare*_*.sys", to read a memory fragment, in order to obtain sensitive information. [severity:1/4; CVE-2015-4077]

An attacker can use the IOCTL 0x226108 of "mdare*_*.sys", to generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2015-5735]

An attacker can use the IOCTL 0x220024/0x220028 of "Fortishield.sys", to change a callback, in order to run code. [severity:2/4; CVE-2015-5736]

An attacker can use the IOCTL 0x2220c8, to access to a privileged handle, in order to escalate his privileges. [severity:2/4; CVE-2015-5737]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about FortiClient: