Description
A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-28184 | A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/advisory/FG-IR-21-190 |
|
History
Fri, 25 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T13:31:02.324Z
Reserved: 2021-09-13T00:00:00.000Z
Link: CVE-2021-41031
Updated: 2024-08-04T02:59:31.141Z
Status : Modified
Published: 2022-07-18T18:15:08.867
Modified: 2024-11-21T06:25:18.773
Link: CVE-2021-41031
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD