Privilege Escalation Vulnerability in FortiClient for Linux by Fortinet
CVE-2019-16155

7.1HIGH

Key Information:

Vendor
Fortinet
Vendor
CVE Published:
7 February 2020

Summary

FortiClient for Linux versions 6.2.1 and earlier exhibit a vulnerability that allows users with low privileges to execute arbitrary file overwrites as root. This occurs via specially crafted 'BackupConfig' IPC client requests directed at the fctsched process, enabling unauthorized modifications to system files. Moreover, versions 6.2.2 and earlier permit low privilege users to write to system backup files through the GUI, resulting in potential root access and system instability. These weaknesses highlight significant risks in maintaining system integrity and protecting sensitive data.

Affected Version(s)

Fortinet FortiClientLinux FortiClientLinux 6.2.1 and below

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.