CVE-2024-47574
EUVD-2024-4253013.11.2024, 12:15
A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| fortinet | forticlientwindows | 7.2.4 ≤ 𝑥 ≤ 7.2.4 |
| fortinet | forticlientwindows | 7.0.12 ≤ 𝑥 ≤ 7.0.12 |
| fortinet | forticlientwindows | 6.4.10 ≤ 𝑥 ≤ 6.4.10 |
| fortinet | forticlient | 6.4.0 ≤ 𝑥 < 7.0.13 |
| fortinet | forticlient | 7.2.0 ≤ 𝑥 < 7.2.5 |
| fortinet | forticlient | 7.4.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-288 - Authentication Bypass Using an Alternate Path or ChannelA product requires authentication, but the product has an alternate path or channel that does not require authentication.
- CWE-306 - Missing Authentication for Critical FunctionThe product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.