A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.
History

Wed, 13 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet
Fortinet forticlientwindows
CPEs cpe:2.3:a:fortinet:forticlientwindows:*:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet forticlientwindows
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Nov 2024 11:30:00 +0000

Type Values Removed Values Added
Description A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published: 2024-11-13T11:15:04.046Z

Updated: 2024-11-13T14:43:08.240Z

Reserved: 2024-09-27T16:19:24.136Z

Link: CVE-2024-47574

cve-icon Vulnrichment

Updated: 2024-11-13T14:42:53.753Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-13T12:15:16.313

Modified: 2024-11-13T17:01:16.850

Link: CVE-2024-47574

cve-icon Redhat

No data.