External Control of File Name Vulnerability in FortiClient for Mac
CVE-2023-45588

7.8HIGH

Key Information:

Vendor
Fortinet
Vendor
CVE Published:
14 March 2025

Summary

A vulnerability in FortiClient for Mac allows local attackers to manipulate file paths, potentially enabling them to execute arbitrary code. This issue arises when a malicious configuration file is created in the /tmp directory before the installation process begins. As a result, compromised installations could lead to unauthorized commands being executed, posing significant security risks for users.

Affected Version(s)

FortiClientMac 7.2.0 <= 7.2.3

FortiClientMac 7.0.6 <= 7.0.10

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.