Fortinet Forticlientlinux vulnerabilities
7 known vulnerabilities affecting fortinet/fortinet_forticlientlinux.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH4MEDIUM3
Vulnerabilities
Page 1 of 1
CVE-2021-44167HIGHCVSS 7.5vFortiClientLinux version 6.0.8 and below, 6.2.9 and below, 6.4.7 and below, 7.0.2 and below2022-05-11
CVE-2021-44167 [MEDIUM] CWE-732 CVE-2021-44167: An incorrect permission assignment for critical resource vulnerability [CWE-732] in FortiClient for
An incorrect permission assignment for critical resource vulnerability [CWE-732] in FortiClient for Linux version 6.0.8 and below, 6.2.9 and below, 6.4.7 and below, 7.0.2 and below may allow an unauthenticated attacker to access sensitive information in log files and directories via symbolic links.
cvelistv5nvd
CVE-2021-22127HIGHCVSS 8.0vFortiClientLinux 6.4.2 and below, FortiClientLinux 6.2.8 and below2022-04-06
CVE-2021-22127 [HIGH] CWE-78 CVE-2021-22127: An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient
An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient for Linux 6.2.x before 6.2.9 may allow an unauthenticated attacker to execute arbitrary code on the host operating system as root via tricking the user into connecting to a network with a malicious name.
cvelistv5nvd
CVE-2021-43205MEDIUMCVSS 5.3vFortiClientLinux 7.0.2 and below, 6.4.7 and below, 6.2.9 and below2022-04-06
CVE-2021-43205 [MEDIUM] CWE-200 CVE-2021-43205: An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient for Linux version 7.0.2 and below, 6.4.7 and below and 6.2.9 and below may allow an unauthenticated attacker to access the confighandler webserver via external binaries.
cvelistv5nvd
CVE-2019-16155HIGHCVSS 7.1vFortiClientLinux 6.2.1 and below2020-02-07
CVE-2019-16155 [HIGH] CVE-2019-16155: A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with
A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to overwrite system files as root with arbitrary content through system backup file via specially crafted "BackupConfig" type IPC client requests to the fctsched process. Further more, FortiClient for Linux 6.2.2 and below allow low privilege user
cvelistv5nvd
CVE-2019-15711HIGHCVSS 7.8vFortiClientLinux 6.2.1 and below2020-02-06
CVE-2019-15711 [HIGH] CVE-2019-15711: A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with
A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
cvelistv5nvd
CVE-2019-17652MEDIUMCVSS 6.5vFortiClientLinux 6.2.1 and below2020-02-06
CVE-2019-17652 [MEDIUM] CWE-787 CVE-2019-17652: A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with
A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to cause FortiClient processes running under root priviledge crashes via sending specially crafted "StartAvCustomScan" type IPC client requests to the fctsched process due the argv data not been well sanitized.
cvelistv5nvd
CVE-2019-16152MEDIUMCVSS 6.5vFortiClientLinux 6.2.1 and below2020-02-06
CVE-2019-16152 [MEDIUM] CWE-20 CVE-2019-16152: A Denial of service (DoS) vulnerability in FortiClient for Linux 6.2.1 and below may allow an user w
A Denial of service (DoS) vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to cause FortiClient processes running under root privilege crashes via sending specially crafted IPC client requests to the fctsched process due the nanomsg not been correctly validated.
cvelistv5nvd