CVE-2024-47574
13.11.2024, 12:15
A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.Enginsight
Vendor | Product | Version |
---|---|---|
fortinet | forticlientwindows | 7.2.4 ≤ 𝑥 ≤ 7.2.4 |
fortinet | forticlientwindows | 7.0.12 ≤ 𝑥 ≤ 7.0.12 |
fortinet | forticlientwindows | 6.4.10 ≤ 𝑥 ≤ 6.4.10 |
fortinet | forticlient | 6.4.0 ≤ 𝑥 < 7.0.13 |
fortinet | forticlient | 7.2.0 ≤ 𝑥 < 7.2.5 |
fortinet | forticlient | 7.4.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-288 - Authentication Bypass Using an Alternate Path or ChannelA product requires authentication, but the product has an alternate path or channel that does not require authentication.
- CWE-306 - Missing Authentication for Critical FunctionThe product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.