Metrics
Affected Vendors & Products
Solution
Please upgrade to FortiClientLinux version 7.4.3 or above Please upgrade to FortiClientLinux version 7.2.8 or above Please upgrade to FortiClientLinux version 7.0.14 or above Please upgrade to FortiClientWindows version 7.4.2 or above Please upgrade to FortiClientWindows version 7.2.7 or above Please upgrade to FortiClientWindows version 7.0.14 or above
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-23-278 |
![]() ![]() |
Thu, 24 Jul 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet forticlient
|
|
CPEs | cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* |
|
Vendors & Products |
Fortinet forticlient
|
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Wed, 18 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 18 Dec 2024 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Cleartext Storage of Sensitive Information vulnerability [CWE-312] in FortiClientWindows 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13 and FortiClientLinux 7.4.0 through 7.4.2, 7.2.0 through 7.2.7, 7.0.0 through 7.0.13 may permit a local authenticated user to retrieve VPN password via memory dump, due to JavaScript's garbage collector | |
Weaknesses | CWE-312 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-08-27T21:29:14.762Z
Reserved: 2024-10-24T11:52:14.402Z
Link: CVE-2024-50570

Updated: 2024-12-18T14:33:12.270Z

Status : Analyzed
Published: 2024-12-18T13:15:06.723
Modified: 2025-07-24T19:02:14.427
Link: CVE-2024-50570

No data.

Updated: 2025-07-12T16:01:29Z