A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-199 |
History
Wed, 13 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet forticlientwindows |
|
CPEs | cpe:2.3:a:fortinet:forticlientwindows:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fortinet
Fortinet forticlientwindows |
|
Metrics |
ssvc
|
Wed, 13 Nov 2024 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages. | |
Weaknesses | CWE-288 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2024-11-13T11:15:04.046Z
Updated: 2024-11-13T14:43:08.240Z
Reserved: 2024-09-27T16:19:24.136Z
Link: CVE-2024-47574
Vulnrichment
Updated: 2024-11-13T14:42:53.753Z
NVD
Status : Awaiting Analysis
Published: 2024-11-13T12:15:16.313
Modified: 2024-11-13T17:01:16.850
Link: CVE-2024-47574
Redhat
No data.