Description
An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiClientLinux version 7.2.1 or above Please upgrade to FortiClientLinux version 7.0.11 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-49882 | An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-087 |
|
History
Fri, 17 Jan 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet
Fortinet forticlient |
|
| CPEs | cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.0.3:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.0.4:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:linux:*:* |
|
| Vendors & Products |
Fortinet
Fortinet forticlient |
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-12T17:46:37.654Z
Reserved: 2023-10-09T08:01:29.297Z
Link: CVE-2023-45590
Updated: 2024-08-02T20:21:16.694Z
Status : Analyzed
Published: 2024-04-09T15:15:27.627
Modified: 2025-01-17T17:08:31.843
Link: CVE-2023-45590
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD