A use of hard-coded credentials vulnerability in Fortinet FortiClient Windows 7.0.0 - 7.0.9 and 7.2.0 - 7.2.1 allows an attacker to bypass system protections via the use of static credentials.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-37467 | A use of hard-coded credentials vulnerability in Fortinet FortiClient Windows 7.0.0 - 7.0.9 and 7.2.0 - 7.2.1 allows an attacker to bypass system protections via the use of static credentials. |
Fixes
Solution
Please upgrade to FortiClientWindows version 7.2.2 or above Please upgrade to FortiClientWindows version 7.0.10 or above
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-108 |
|
History
No history.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-30T18:11:16.400Z
Reserved: 2023-05-22T07:58:22.197Z
Link: CVE-2023-33304
Updated: 2024-08-02T15:39:36.160Z
Status : Modified
Published: 2023-11-14T18:15:30.133
Modified: 2024-11-21T08:05:22.530
Link: CVE-2023-33304
No data.
OpenCVE Enrichment
No data.
EUVD