CVE-2024-50564

Severity
3.3LOW
EPSS
0.1%
top 77.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 14

Description

A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 1.8 | Impact: 1.4

Affected Packages2 packages

CVEListV5fortinet/forticlientwindows7.2.07.2.7+3
NVDfortinet/forticlient6.4.07.2.9+1

🔴Vulnerability Details

2
CVEList
CVE-2024-50564: A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 72025-01-14
GHSA
GHSA-4pvm-5x6h-f3qp: A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 72025-01-14

📋Vendor Advisories

1
Fortinet
A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versio...2025-01-14
CVE-2024-50564 (LOW CVSS 3.3) | A use of hard-coded cryptographic k | cvebase.io