Description
A download of code without Integrity check vulnerability [CWE-494] in FortiClientMac version 7.0.0 through 7.0.7, 6.4 all versions, 6.2 all versions, 6.0 all versions, 5.6 all versions, 5.4 all versions, 5.2 all versions, 5.0 all versions and 4.0 all versions may allow a local attacker to escalate their privileges via modifying the installer upon upgrade.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiClientMac version 7.0.8 or above. Please upgrade to FortiClientMac version 7.2.0 or above.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-26769 | A download of code without Integrity check vulnerability [CWE-494] in FortiClientMac version 7.0.0 through 7.0.7, 6.4 all versions, 6.2 all versions, 6.0 all versions, 5.6 all versions, 5.4 all versions, 5.2 all versions, 5.0 all versions and 4.0 all versions may allow a local attacker to escalate their privileges via modifying the installer upon upgrade. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-22-481 |
|
History
Wed, 23 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-23T14:30:57.422Z
Reserved: 2023-01-05T10:06:31.521Z
Link: CVE-2023-22635
Updated: 2024-08-02T10:13:49.410Z
Status : Modified
Published: 2023-04-11T17:15:08.043
Modified: 2024-11-21T07:45:05.787
Link: CVE-2023-22635
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD