Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-36368 | An improper verification of source of a communication channel vulnerability [CWE-940] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, 6.4 all versions may allow a remote attacker to bypass the trusted host feature via session connection. |
Solution
Please upgrade to FortiClientEMS version 7.4.1 or above Please upgrade to FortiClientEMS version 7.2.5 or above Please upgrade to FortiSASE version 24.2.c or above
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-078 |
![]() ![]() |
Fri, 31 Jan 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet forticlientems Fortinet forticlientems Cloud |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:fortinet:forticlientems:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientems:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientems_cloud:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientems_cloud:7.4.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet forticlientems Fortinet forticlientems Cloud |
Wed, 15 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 14 Jan 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An improper verification of source of a communication channel vulnerability [CWE-940] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, 6.4 all versions may allow a remote attacker to bypass the trusted host feature via session connection. | |
Weaknesses | CWE-940 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-01-15T14:55:47.884Z
Reserved: 2024-05-29T08:44:50.759Z
Link: CVE-2024-36506

Updated: 2025-01-15T14:55:42.397Z

Status : Analyzed
Published: 2025-01-14T14:15:30.590
Modified: 2025-01-31T17:10:44.853
Link: CVE-2024-36506

No data.

No data.