cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-36510,https://securityvulnerability.io/vulnerability/CVE-2024-36510,Observable Response Discrepancy Vulnerability in Fortinet Products,"An observable response discrepancy vulnerability exists in FortiClientEMS and FortiSOAR, allowing unauthenticated attackers to potentially enumerate valid users by analyzing the variations in login request responses. This could lead to an increased risk of unauthorized access and exploitation. It is crucial for organizations using these Fortinet products to implement remedial measures to safeguard user authentication mechanisms and ensure robust security practices.",Fortinet,"Forticlientems,Fortisoar",5.3,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-01-14T14:15:00.000Z,0 CVE-2024-36506,https://securityvulnerability.io/vulnerability/CVE-2024-36506,Remote Communication Vulnerability in Fortinet FortiClientEMS,"The vulnerability in Fortinet FortiClientEMS occurs due to improper verification of the source of a communication channel, which affects multiple versions, including 7.4.0, 7.2.0 through 7.2.4, as well as all versions of 7.0 and 6.4. This weakness may allow a remote attacker to exploit the trusted host feature, potentially enabling unauthorized session connections. It highlights the need for rigorous verification mechanisms to safeguard secure communications against unauthorized access.",Fortinet,Forticlientems,5.3,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-01-14T14:15:00.000Z,0 CVE-2024-21753,https://securityvulnerability.io/vulnerability/CVE-2024-21753,FortiClientEMS Vulnerability Allows Path Traversal and Denial of Service,"A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiClientEMS versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.13, 6.4.0 through 6.4.9, 6.2.0 through 6.2.9, 6.0.0 through 6.0.8, 1.2.1 through 1.2.5 allows attacker to perform a denial of service, read or write a limited number of files via specially crafted HTTP requests",Fortinet,Forticlientems,6,MEDIUM,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-09-10T14:37:48.466Z,0 CVE-2024-31489,https://securityvulnerability.io/vulnerability/CVE-2024-31489,FortiClient Zero-Day Vulnerability Allows Remote Man-in-the-Middle Attacks,"An improper certificate validation vulnerability in Fortinet's FortiClient software allows remote, unauthenticated attackers to exploit the communication channel between FortiGate and FortiClient during ZTNA tunnel creation. This flaw can potentially enable a Man-in-the-Middle attack, where attackers could intercept and manipulate data in transit, compromising the integrity and confidentiality of sensitive information exchanged during secure connections.",Fortinet,"Forticlientmac,Forticlientems,Forticlientlinux,Forticlientwindows",8.1,HIGH,0.000910000002477318,false,,false,false,false,,,false,false,,2024-09-10T14:37:48.066Z,0 CVE-2024-33508,https://securityvulnerability.io/vulnerability/CVE-2024-33508,UnAuthenticated Command Injection Vulnerability in FortiClientEMS,"Fortinet FortiClientEMS software, specifically versions 7.2.0 through 7.2.4 and 7.0.0 through 7.0.12, is susceptible to a command injection vulnerability. This flaw arises from improper neutralization of special elements during command processing, identified as CWE-77. Exploitation of this vulnerability could enable an unauthenticated attacker to execute unauthorized operations on the underlying database by crafting malicious requests, potentially compromising data integrity and availability.",Fortinet,Forticlientems,7.3,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-09-10T14:37:45.323Z,0 CVE-2023-47534,https://securityvulnerability.io/vulnerability/CVE-2023-47534,Unauthorized Code Execution Vulnerability in FortiClientEMS,"A vulnerability exists in Fortinet's FortiClientEMS, specifically affecting versions 7.2.0 to 7.2.2, 7.0.0 to 7.0.10, 6.4.0 to 6.4.9, 6.2.0 to 6.2.9, and 6.0.0 to 6.0.8 due to improper handling of formula elements in CSV files. This flaw allows an attacker to execute unauthorized commands by sending specially crafted packets, thereby posing significant security risks to the integrity and functionality of the affected software environments.",Fortinet,Forticlientems,8.7,HIGH,0.0010499999625608325,false,,false,false,false,,,false,false,,2024-03-12T15:09:19.802Z,0 CVE-2023-48788,https://securityvulnerability.io/vulnerability/CVE-2023-48788,SQL Injection Vulnerability in Fortinet FortiClientEMS Products,"An SQL injection vulnerability exists in specific versions of Fortinet FortiClientEMS, allowing attackers to exploit improper neutralization of special elements used in SQL commands. This vulnerability permits unauthorized code execution via specially crafted packets, potentially compromising the affected systems and leading to unauthorized access and control. Users of FortiClientEMS should be aware of this vulnerability and take appropriate measures to mitigate risks.",Fortinet,Forticlientems,9.8,CRITICAL,0.9682300090789795,true,2024-03-25T00:00:00.000Z,true,true,true,2024-03-21T20:54:08.000Z,true,true,true,2024-03-18T03:52:02.309Z,2024-03-12T15:09:18.527Z,8543 CVE-2023-45581,https://securityvulnerability.io/vulnerability/CVE-2023-45581,Improper Privilege Management Vulnerability Affects FortiClientEMS,"An improper privilege management vulnerability in Fortinet FortiClientEMS versions 7.2.0 through 7.2.2 and prior to 7.0.10 allows a Site administrator with Super Admin privileges to execute global administrative operations that impact multiple sites. This exploit can be initiated through crafted HTTP or HTTPS requests, posing a significant risk to system integrity and security across affected environments.",Fortinet,FortiClientEMS,7.2,HIGH,0.0005799999926239252,false,,false,false,false,,,false,false,,2024-02-15T13:59:23.728Z,0 CVE-2021-44172,https://securityvulnerability.io/vulnerability/CVE-2021-44172,Sensitive Information Exposure in FortiClientEMS Product by Fortinet,"A vulnerability exists in FortiClientEMS management interface versions 7.0.0 to 7.0.4, 7.0.6 to 7.0.7, and all 6.4 and 6.2 versions that allows unauthorized access. This flaw could potentially allow an unauthenticated attacker to retrieve sensitive information such as the EMS installation path and other environment variables, thereby compromising system integrity. Users are recommended to update to the latest versions and secure their deployments.",Fortinet,Forticlientems,3.6,LOW,0.0006900000153109431,false,,false,false,false,,,false,false,,2023-09-13T12:30:09.839Z,0 CVE-2021-41028,https://securityvulnerability.io/vulnerability/CVE-2021-41028,Man-in-the-middle Attack Vulnerability in Fortinet FortiClient Products,"The vulnerability arises from the use of hard-coded cryptographic keys in versions of FortiClientEMS and improper certificate validation in FortiClient for Windows, Linux, and Mac. This flawed implementation enables an unauthenticated and network-adjacent attacker to potentially execute a man-in-the-middle attack through the telemetry protocol, compromising secure communication between the EMS and FortiClient.",Fortinet,"Fortinet Forticlientems, Forticlientwindows, Forticlientlinux, Forticlientmac",8.2,HIGH,0.000699999975040555,false,,false,false,false,,,false,false,,2021-12-16T18:13:38.000Z,0 CVE-2021-36189,https://securityvulnerability.io/vulnerability/CVE-2021-36189,Information Disclosure Vulnerability in Fortinet FortiClientEMS,"A vulnerability exists in Fortinet FortiClientEMS where sensitive data is not adequately encrypted, allowing attackers to access decrypted information through browser inspection in versions 6.4.4 and earlier, as well as in version 7.0.1 and below. This oversight poses significant risks for organizations relying on proper data protection measures.",Fortinet,Fortinet Forticlientems,6.8,MEDIUM,0.0006099999882280827,false,,false,false,false,,,false,false,,2021-12-09T09:10:03.000Z,0 CVE-2021-41030,https://securityvulnerability.io/vulnerability/CVE-2021-41030,Authentication Bypass in FortiClient EMS by Fortinet,"An authentication bypass vulnerability exists in FortiClient EMS versions 7.0.1 and below and 6.4.4 and below, which could be exploited by an unauthenticated attacker. This flaw allows the attacker to impersonate existing users by intercepting and reusing valid SAML authentication messages, effectively bypassing authentication mechanisms and posing a significant risk to the security of the affected systems.",Fortinet,Fortinet Forticlientems,5.4,MEDIUM,0.00215999991632998,false,,false,false,false,,,false,false,,2021-12-08T17:51:12.000Z,0 CVE-2021-32592,https://securityvulnerability.io/vulnerability/CVE-2021-32592,Unsafe Search Path Vulnerability in FortiClient by Fortinet,"This vulnerability revolves around an unsafe search path in FortiClient and FortiClientEMS, affecting multiple versions. An attacker could exploit this flaw by placing a malicious OpenSSL engine library in the search path, facilitating a DLL Hijack attack on the affected devices. Such an attack could potentially compromise sensitive information and the integrity of the system. Organizations using the impacted versions should assess their risk and apply necessary mitigations to safeguard their infrastructure.",Fortinet,"Fortinet Forticlientwindows, Forticlientems",7.8,HIGH,0.0006300000241026282,false,,false,false,false,,,false,false,,2021-12-01T11:27:11.000Z,0 CVE-2020-15940,https://securityvulnerability.io/vulnerability/CVE-2020-15940,Input Injection Vulnerability in FortiClientEMS by Fortinet,"An improper neutralization of input vulnerability allows a remote authenticated attacker to exploit vulnerable versions of FortiClientEMS by injecting malicious scripts or tags through the name parameter in various sections of the server. This vulnerability affects versions 6.4.1 and below and 6.2.9 and below, posing significant risks to web security and integrity.",Fortinet,Fortinet Forticlientems,4.1,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2021-11-02T17:49:37.000Z,0 CVE-2021-24019,https://securityvulnerability.io/vulnerability/CVE-2021-24019,Insufficient Session Expiration in FortiClientEMS by Fortinet,"FortiClientEMS versions 6.4.2 and below, as well as 6.2.8 and below, are affected by an insufficient session expiration vulnerability. This issue allows attackers to exploit unexpired session IDs of admin users, potentially granting them unauthorized administrative access. If an attacker can obtain these session IDs through various means, they may be able to reuse them, circumventing normal authentication mechanisms and gaining elevated privileges. Organizations using affected versions should take immediate action to update their systems to mitigate this risk.",Fortinet,Fortinet Forticlientems,8.1,HIGH,0.002219999907538295,false,,false,false,false,,,false,false,,2021-10-06T09:41:10.000Z,0 CVE-2020-15941,https://securityvulnerability.io/vulnerability/CVE-2020-15941,Path Traversal Vulnerability in FortiClientEMS by Fortinet,"A path traversal vulnerability exists in FortiClientEMS versions 6.4.1 and earlier, as well as in 6.2.8 and earlier. This issue allows authenticated attackers to exploit the vulnerability by injecting directory traversal character sequences. By manipulating the name parameter of Deployment Packages, attackers can potentially add or delete files on the server, leading to unauthorized file access and potential system compromise.",Fortinet,Fortinet Forticlientems,5.4,MEDIUM,0.0007200000109151006,false,,false,false,false,,,false,false,,2021-10-06T09:27:32.000Z,0