Relative Path Traversal Vulnerability in Fortinet FortiClient
CVE-2022-42470

7.1HIGH

Key Information:

Vendor
Fortinet
Vendor
CVE Published:
11 April 2023

Summary

A vulnerability in Fortinet FortiClient for Windows allows attackers to exploit a relative path traversal flaw. This issue arises in certain versions, enabling an attacker to send a specially crafted request through a named pipe, which could result in unauthorized code execution or commands. Users of FortiClient versions 7.0.0 to 7.0.7, 6.4.0 to 6.4.9, 6.2.0 to 6.2.9, and 6.0.0 to 6.0.10 are advised to update their software to mitigate potential security risks. For further details, visit the official Fortinet guidance here.

Affected Version(s)

FortiClientWindows 7.0.0 <= 7.0.7

FortiClientWindows 6.4.0 <= 6.4.10

FortiClientWindows 6.2.0 <= 6.2.9

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.