Description
A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.
Published: 2025-01-14
Score: 3.2 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Please upgrade to FortiClientWindows version 7.4.1 or above

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-44585 A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.
History

Wed, 11 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:*

Mon, 03 Feb 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet
Fortinet forticlient
Weaknesses CWE-798
CPEs cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*
Vendors & Products Fortinet
Fortinet forticlient

Wed, 15 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Jan 2025 14:15:00 +0000

Type Values Removed Values Added
Description A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.
Weaknesses CWE-321
References
Metrics cvssV3_1

{'score': 3.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:U/RC:C'}


Subscriptions

Fortinet Forticlient
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-01-15T14:53:40.154Z

Reserved: 2024-10-24T11:52:14.401Z

Link: CVE-2024-50564

cve-icon Vulnrichment

Updated: 2025-01-15T14:53:36.826Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-14T14:15:33.490

Modified: 2025-06-11T14:55:09.987

Link: CVE-2024-50564

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses