An improper verification of source of a communication channel vulnerability [CWE-940] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, 6.4 all versions may allow a remote attacker to bypass the trusted host feature via session connection.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-078 |
History
Wed, 15 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 14 Jan 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An improper verification of source of a communication channel vulnerability [CWE-940] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, 6.4 all versions may allow a remote attacker to bypass the trusted host feature via session connection. | |
Weaknesses | CWE-940 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2025-01-14T14:09:52.227Z
Updated: 2025-01-15T14:55:47.884Z
Reserved: 2024-05-29T08:44:50.759Z
Link: CVE-2024-36506
Vulnrichment
Updated: 2025-01-15T14:55:42.397Z
NVD
Status : Received
Published: 2025-01-14T14:15:30.590
Modified: 2025-01-14T14:15:30.590
Link: CVE-2024-36506
Redhat
No data.