Arbitrary Code Execution Vulnerability in FortiClientMac Installer
CVE-2024-31492
What is CVE-2024-31492?
An external control of file name or path vulnerability exists in FortiClient for Mac that can be exploited by local attackers. The vulnerability arises during the installation process, where a malicious configuration file can be introduced in the /tmp directory before the installation begins. This flaw may enable an attacker to execute arbitrary code or commands, posing a significant security risk to users with affected versions. Proper configuration and vigilance are essential to mitigate these risks and protect system integrity.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
FortiClientMac 7.2.0 <= 7.2.3
FortiClientMac 7.0.6 <= 7.0.10
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved