Description
An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient for Linux 6.2.x before 6.2.9 may allow an unauthenticated attacker to execute arbitrary code on the host operating system as root via tricking the user into connecting to a network with a malicious name.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-9283 | An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient for Linux 6.2.x before 6.2.9 may allow an unauthenticated attacker to execute arbitrary code on the host operating system as root via tricking the user into connecting to a network with a malicious name. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/advisory/FG-IR-20-241 |
|
History
Fri, 25 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T13:32:52.692Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-22127
Updated: 2024-08-03T18:30:23.950Z
Status : Modified
Published: 2022-04-06T16:15:07.787
Modified: 2024-11-21T05:49:33.407
Link: CVE-2021-22127
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD