Description
A use of hard-coded credentials vulnerability in Fortinet FortiClient Windows 7.0.0 - 7.0.9 and 7.2.0 - 7.2.1 allows an attacker to bypass system protections via the use of static credentials.
Published: 2023-11-14
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Please upgrade to FortiClientWindows version 7.2.2 or above Please upgrade to FortiClientWindows version 7.0.10 or above

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-37467 A use of hard-coded credentials vulnerability in Fortinet FortiClient Windows 7.0.0 - 7.0.9 and 7.2.0 - 7.2.1 allows an attacker to bypass system protections via the use of static credentials.
References
History

No history.

Subscriptions

Fortinet Forticlient
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-08-30T18:11:16.400Z

Reserved: 2023-05-22T07:58:22.197Z

Link: CVE-2023-33304

cve-icon Vulnrichment

Updated: 2024-08-02T15:39:36.160Z

cve-icon NVD

Status : Modified

Published: 2023-11-14T18:15:30.133

Modified: 2024-11-21T08:05:22.530

Link: CVE-2023-33304

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses