cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-15934,https://securityvulnerability.io/vulnerability/CVE-2020-15934,Local Privilege Escalation Vulnerability in FortiClient for Linux,"CVE-2020-15934 is a vulnerability affecting FortiClient for Linux that allows local users to execute commands with elevated privileges due to the VCM engine handling certain operations improperly. Specifically, this vulnerability enables the creation of malicious scripts or programs by an unprivileged user that, when executed, can escalate their privileges to root on the target machine. Affected versions include FortiClient for Linux versions 6.2.7 and earlier, as well as version 6.4.0. It is crucial for users of these versions to apply security updates and follow best practices to mitigate this risk.",Fortinet,Forticlientlinux,8.6,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-12-19T10:57:39.255Z,0 CVE-2022-45856,https://securityvulnerability.io/vulnerability/CVE-2022-45856,Improper Certificate Validation Vulnerability May Allow Unauthenticated MITM Attack on SAML SSO Feature,"An improper certificate validation vulnerability exists in FortiClient products, potentially enabling an unauthenticated attacker to intercept and manipulate communications between FortiClient and both service providers and identity providers. This vulnerability impacts various platforms including Windows, Mac, Linux, Android, and iOS across multiple versions. Proper validation of certificates is critical to prevent man-in-the-middle attacks, which could lead to unauthorized information exposure and loss of data integrity.",Fortinet,"ForticlientiOS,Forticlientandroid,Forticlientmac,Forticlientlinux,Forticlientwindows",5.9,MEDIUM,0.0008699999889358878,false,false,false,false,,false,false,2024-09-10T14:37:48.663Z,0 CVE-2024-31489,https://securityvulnerability.io/vulnerability/CVE-2024-31489,FortiClient Zero-Day Vulnerability Allows Remote Man-in-the-Middle Attacks,"An improper certificate validation vulnerability in Fortinet's FortiClient software allows remote, unauthenticated attackers to exploit the communication channel between FortiGate and FortiClient during ZTNA tunnel creation. This flaw can potentially enable a Man-in-the-Middle attack, where attackers could intercept and manipulate data in transit, compromising the integrity and confidentiality of sensitive information exchanged during secure connections.",Fortinet,"Forticlientmac,Forticlientems,Forticlientlinux,Forticlientwindows",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-09-10T14:37:48.066Z,0 CVE-2023-45590,https://securityvulnerability.io/vulnerability/CVE-2023-45590,FortiClientLinux Code Injection Vulnerability Allows Unauthorized Code Execution,"A vulnerability reported in Fortinet's FortiClientLinux allows for code injection due to improper handling of code generation. This security flaw affects specific versions of the software, including 7.2.0 and versions from 7.0.3 to 7.0.10. Attackers can exploit this vulnerability by tricking users into accessing a malicious website, potentially allowing unauthorized code execution on their systems, which could lead to further compromises.",Fortinet,Forticlientlinux,8.8,HIGH,0.00107999995816499,false,true,false,false,,false,false,2024-04-09T14:24:19.922Z,0 CVE-2023-37939,https://securityvulnerability.io/vulnerability/CVE-2023-37939,,"An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient for Windows 7.2.0, 7.0 all versions, 6.4 all versions, 6.2 all versions, Linux 7.2.0, 7.0 all versions, 6.4 all versions, 6.2 all versions and Mac 7.2.0 through 7.2.1, 7.0 all versions, 6.4 all versions, 6.2 all versions, may allow a local authenticated attacker with no Administrative privileges to retrieve the list of files or folders excluded from malware scanning.",Fortinet,"Forticlientmac,Forticlientwindows,Forticlientlinux",3,LOW,0.0004199999966658652,false,false,false,false,,false,false,2023-10-10T17:15:00.000Z,0 CVE-2021-44167,https://securityvulnerability.io/vulnerability/CVE-2021-44167,,"An incorrect permission assignment for critical resource vulnerability [CWE-732] in FortiClient for Linux version 6.0.8 and below, 6.2.9 and below, 6.4.7 and below, 7.0.2 and below may allow an unauthenticated attacker to access sensitive information in log files and directories via symbolic links.",Fortinet,Fortinet Forticlientlinux,6.8,MEDIUM,0.0015200000489130616,false,false,false,false,,false,false,2022-05-11T14:25:10.000Z,0 CVE-2021-22127,https://securityvulnerability.io/vulnerability/CVE-2021-22127,,"An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient for Linux 6.2.x before 6.2.9 may allow an unauthenticated attacker to execute arbitrary code on the host operating system as root via tricking the user into connecting to a network with a malicious name.",Fortinet,Fortinet Forticlientlinux,7.1,HIGH,0.0006900000153109431,false,false,false,false,,false,false,2022-04-06T16:00:33.000Z,0 CVE-2021-43205,https://securityvulnerability.io/vulnerability/CVE-2021-43205,,"An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient for Linux version 7.0.2 and below, 6.4.7 and below and 6.2.9 and below may allow an unauthenticated attacker to access the confighandler webserver via external binaries.",Fortinet,Fortinet Forticlientlinux,4.3,MEDIUM,0.0008900000248104334,false,false,false,false,,false,false,2022-04-06T09:15:36.000Z,0 CVE-2021-41028,https://securityvulnerability.io/vulnerability/CVE-2021-41028,,"A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.",Fortinet,"Fortinet Forticlientems, Forticlientwindows, Forticlientlinux, Forticlientmac",8.2,HIGH,0.000699999975040555,false,false,false,false,,false,false,2021-12-16T18:13:38.000Z,0 CVE-2019-16155,https://securityvulnerability.io/vulnerability/CVE-2019-16155,,"A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to overwrite system files as root with arbitrary content through system backup file via specially crafted ""BackupConfig"" type IPC client requests to the fctsched process. Further more, FortiClient for Linux 6.2.2 and below allow low privilege user write the system backup file under root privilege through GUI thus can cause root system file overwrite.",Fortinet,Fortinet Forticlientlinux,7.1,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2020-02-07T14:47:28.000Z,0 CVE-2019-16152,https://securityvulnerability.io/vulnerability/CVE-2019-16152,,A Denial of service (DoS) vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to cause FortiClient processes running under root privilege crashes via sending specially crafted IPC client requests to the fctsched process due the nanomsg not been correctly validated.,Fortinet,Fortinet Forticlientlinux,6.5,MEDIUM,0.0006799999973736703,false,false,false,false,,false,false,2020-02-06T15:27:36.000Z,0 CVE-2019-17652,https://securityvulnerability.io/vulnerability/CVE-2019-17652,,"A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to cause FortiClient processes running under root priviledge crashes via sending specially crafted ""StartAvCustomScan"" type IPC client requests to the fctsched process due the argv data not been well sanitized.",Fortinet,Fortinet Forticlientlinux,6.5,MEDIUM,0.0007800000021234155,false,false,false,false,,false,false,2020-02-06T15:23:33.000Z,0 CVE-2019-15711,https://securityvulnerability.io/vulnerability/CVE-2019-15711,,"A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted ""ExportLogs"" type IPC client requests to the fctsched process.",Fortinet,Fortinet Forticlientlinux,7.8,HIGH,0.0004799999878741801,false,false,false,false,,false,false,2020-02-06T15:10:07.000Z,0