VYPR

FortiClientWindows

by Fortinet

CVEs (14)

  • CVE-2016-8493HigJun 26, 2017
    risk 0.57cvss 8.8epss 0.01

    In FortiClientWindows 5.4.1 and 5.4.2, an attacker may escalate privilege via a FortiClientNamedPipe vulnerability.

  • CVE-2021-41031Jul 18, 2022
    risk 0.00cvss epss 0.00

    A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service.

  • CVE-2022-26113Jul 18, 2022
    risk 0.00cvss epss 0.00

    An execution with unnecessary privileges vulnerability [CWE-250] in FortiClientWindows 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.10 may allow a local attacker to perform an arbitrary file write on the system.

  • CVE-2021-43066May 11, 2022
    risk 0.00cvss epss 0.00

    A external control of file name or path in Fortinet FortiClientWindows version 7.0.2 and below, version 6.4.6 and below, version 6.2.9 and below, version 6.0.10 and below allows attacker to escalate privilege via the MSI installer.

  • CVE-2021-44169Apr 6, 2022
    risk 0.00cvss epss 0.00

    A improper initialization in Fortinet FortiClient (Windows) version 6.0.10 and below, version 6.2.9 and below, version 6.4.7 and below, version 7.0.3 and below allows attacker to gain administrative privileges via placing a malicious executable inside the FortiClient installer's…

  • CVE-2021-36167Dec 9, 2021
    risk 0.00cvss epss 0.00

    An improper authorization vulnerabiltiy [CWE-285] in FortiClient Windows versions 7.0.0 and 6.4.6 and below and 6.2.8 and below may allow an unauthenticated attacker to bypass the webfilter control via modifying the session-id paramater.

  • CVE-2021-43204Dec 9, 2021
    risk 0.00cvss epss 0.00

    A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions.

  • CVE-2021-36183Nov 2, 2021
    risk 0.00cvss epss 0.00

    An improper authorization vulnerability [CWE-285] in FortiClient for Windows versions 7.0.1 and below and 6.4.2 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for Forticlient updates.

  • CVE-2020-9291Jun 1, 2020
    risk 0.00cvss epss 0.00

    An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.

  • CVE-2020-9290Mar 15, 2020
    risk 0.00cvss epss 0.00

    An Unsafe Search Path vulnerability in FortiClient for Windows online installer 6.2.3 and below may allow a local attacker with control over the directory in which FortiClientOnlineInstaller.exe and FortiClientVPNOnlineInstaller.exe resides to execute arbitrary code on the…

  • CVE-2019-17658Mar 12, 2020
    risk 0.00cvss epss 0.00

    An unquoted service path vulnerability in the FortiClient FortiTray component of FortiClientWindows v6.2.2 and prior allow an attacker to gain elevated privileges via the FortiClientConsole executable service path.

  • CVE-2018-13368May 30, 2019
    risk 0.00cvss epss 0.00

    A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attacker to execute unauthorized code or commands via the command injection.

  • CVE-2018-9191May 30, 2019
    risk 0.00cvss epss 0.00

    A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attackers to execute unauthorized code or commands via the named pipe responsible for Forticlient updates.

  • CVE-2019-5589May 28, 2019
    risk 0.00cvss epss 0.01

    An Unsafe Search Path vulnerability in FortiClient Online Installer (Windows version before 6.0.6) may allow an unauthenticated, remote attacker with control over the directory in which FortiClientOnlineInstaller.exe resides to execute arbitrary code on the system via uploading…