Remote Communication Vulnerability in Fortinet FortiClientEMS
CVE-2024-36506
3.5LOW
Summary
The vulnerability in Fortinet FortiClientEMS occurs due to improper verification of the source of a communication channel, which affects multiple versions, including 7.4.0, 7.2.0 through 7.2.4, as well as all versions of 7.0 and 6.4. This weakness may allow a remote attacker to exploit the trusted host feature, potentially enabling unauthorized session connections. It highlights the need for rigorous verification mechanisms to safeguard secure communications against unauthorized access.
Affected Version(s)
FortiClientEMS 7.4.0
FortiClientEMS 7.2.0 <= 7.2.4
FortiClientEMS 7.0.0 <= 7.0.13
References
CVSS V3.1
Score:
3.5
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published