AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation
Advisories
Source ID Title
EUVD EUVD EUVD-2024-29369 AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation
Fixes

Solution

Please upgrade to FortiClientMac version 7.2.5 or above Please upgrade to FortiClientMac version 7.0.12 or above Please upgrade to FortiClientEMS version 7.2.0 or above Please upgrade to FortiClientLinux version 7.2.1 or above Please upgrade to FortiClientLinux version 7.0.12 or above Please upgrade to FortiClientWindows version 7.2.3 or above Please upgrade to FortiClientWindows version 7.0.12 or above


Workaround

No workaround given by the vendor.

History

Fri, 20 Sep 2024 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet forticlient
CPEs cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:*
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*
cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:linux:*:*
Vendors & Products Fortinet forticlient

Tue, 10 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet
Fortinet forticlientlinux
Fortinet forticlientmac
Fortinet forticlientwindows
CPEs cpe:2.3:a:fortinet:forticlientlinux:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientmac:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:*:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet forticlientlinux
Fortinet forticlientmac
Fortinet forticlientwindows
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Sep 2024 14:45:00 +0000

Type Values Removed Values Added
Description AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation
Weaknesses CWE-295
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:U/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-09-10T17:52:01.310Z

Reserved: 2024-04-04T12:52:41.585Z

Link: CVE-2024-31489

cve-icon Vulnrichment

Updated: 2024-09-10T17:51:55.710Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-10T15:15:15.787

Modified: 2024-09-20T19:41:19.447

Link: CVE-2024-31489

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.