Description
A use of hard-coded credentials vulnerability in Fortinet FortiClient Windows 7.0.0 - 7.0.9 and 7.2.0 - 7.2.1 allows an attacker to bypass system protections via the use of static credentials.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiClientWindows version 7.2.2 or above Please upgrade to FortiClientWindows version 7.0.10 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-37467 | A use of hard-coded credentials vulnerability in Fortinet FortiClient Windows 7.0.0 - 7.0.9 and 7.2.0 - 7.2.1 allows an attacker to bypass system protections via the use of static credentials. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-108 |
|
History
No history.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-30T18:11:16.400Z
Reserved: 2023-05-22T07:58:22.197Z
Link: CVE-2023-33304
Updated: 2024-08-02T15:39:36.160Z
Status : Modified
Published: 2023-11-14T18:15:30.133
Modified: 2024-11-21T08:05:22.530
Link: CVE-2023-33304
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD