Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2018-20790 | A researcher has disclosed several vulnerabilities against FortiClient for Windows version 6.0.5 and below, version 5.6.6, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows. |
Solution
It is advised that all customers update their Vulnerability Scan engine to v2.00027 or later to protect against this vulnerability. In FortiClient -> About -> Engines -> Vulnerability, ensure version is 2.00027 or greater. The engine update will be pushed automatically to all FortiClients. Upgrade to FortiClient 6.0.5.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://fortiguard.com/advisory/FG-IR-18-108 |
![]() ![]() |
Mon, 24 Mar 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attacker to execute unauthorized code or commands via the parsing of the file. | A researcher has disclosed several vulnerabilities against FortiClient for Windows version 6.0.5 and below, version 5.6.6, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows. |
Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-03-24T15:43:31.634Z
Reserved: 2018-04-02T00:00:00
Link: CVE-2018-9193

Updated: 2024-08-05T07:17:51.468Z

Status : Modified
Published: 2019-05-30T17:29:00.340
Modified: 2025-03-24T16:15:15.103
Link: CVE-2018-9193

No data.

No data.