Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-20790 | A researcher has disclosed several vulnerabilities against FortiClient for Windows version 6.0.5 and below, version 5.6.6, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows. |
Solution
It is advised that all customers update their Vulnerability Scan engine to v2.00027 or later to protect against this vulnerability. In FortiClient -> About -> Engines -> Vulnerability, ensure version is 2.00027 or greater. The engine update will be pushed automatically to all FortiClients. Upgrade to FortiClient 6.0.5.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://fortiguard.com/advisory/FG-IR-18-108 |
|
Mon, 24 Mar 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attacker to execute unauthorized code or commands via the parsing of the file. | A researcher has disclosed several vulnerabilities against FortiClient for Windows version 6.0.5 and below, version 5.6.6, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows. |
| Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-03-24T15:43:31.634Z
Reserved: 2018-04-02T00:00:00
Link: CVE-2018-9193
Updated: 2024-08-05T07:17:51.468Z
Status : Modified
Published: 2019-05-30T17:29:00.340
Modified: 2025-03-24T16:15:15.103
Link: CVE-2018-9193
No data.
OpenCVE Enrichment
No data.
EUVD