CVE-2020-9291Resource Exposure in Fortinet Forticlient

CWE-668Resource Exposure4 documents4 sources
Severity
7.8HIGHNVD
CNA6.3
EPSS
0.1%
top 69.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 1
Latest updateMay 24

Description

An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5fortinet/fortinet_forticlient_for_windowsFortiClient for Windows 6.2.1 and earlier and FortiClient for Windows 6.0.9 and earlier
NVDfortinet/forticlient6.2.06.2.1+1

🔴Vulnerability Details

2
GHSA
GHSA-qrcx-r22r-r6xm: An Insecure Temporary File vulnerability in FortiClient for Windows 62022-05-24
CVEList
CVE-2020-9291: An Insecure Temporary File vulnerability in FortiClient for Windows 62020-06-01

📋Vendor Advisories

1
Fortinet
An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain eleva...2020-06-01
CVE-2020-9291 — Resource Exposure in Fortinet | cvebase