An improper verification of cryptographic signature vulnerability [CWE-347] in FortiClient MacOS version 7.4.0, version 7.2.4 and below, version 7.0.10 and below, version 6.4.10 and below may allow a local authenticated attacker to swap the installer with a malicious package via a race condition during the installation process.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-022 |
History
Wed, 13 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet forticlientmac |
|
CPEs | cpe:2.3:a:fortinet:forticlientmac:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fortinet
Fortinet forticlientmac |
|
Metrics |
ssvc
|
Tue, 12 Nov 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An improper verification of cryptographic signature vulnerability [CWE-347] in FortiClient MacOS version 7.4.0, version 7.2.4 and below, version 7.0.10 and below, version 6.4.10 and below may allow a local authenticated attacker to swap the installer with a malicious package via a race condition during the installation process. | |
Weaknesses | CWE-347 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2024-11-12T18:53:49.686Z
Updated: 2024-11-13T18:30:43.925Z
Reserved: 2024-07-05T11:55:50.011Z
Link: CVE-2024-40592
Vulnrichment
Updated: 2024-11-13T18:30:35.763Z
NVD
Status : Awaiting Analysis
Published: 2024-11-12T19:15:11.013
Modified: 2024-11-13T17:01:16.850
Link: CVE-2024-40592
Redhat
No data.