First published: Tue Jun 25 2013(Updated: )
FortiClient before 4.3.5.472 on Windows, before 4.0.3.134 on Mac OS X, and before 4.0 on Android; FortiClient Lite before 4.3.4.461 on Windows; FortiClient Lite 2.0 through 2.0.0223 on Android; and FortiClient SSL VPN before 4.0.2258 on Linux proceed with an SSL session after determining that the server's X.509 certificate is invalid, which allows man-in-the-middle attackers to obtain sensitive information by leveraging a password transmission that occurs before the user warning about the certificate problem.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Virtual Private Network | <=4.3.3.445 | |
Microsoft Windows | ||
Fortinet FortiClient | <=4.3.3.445 | |
Fortinet FortiClient | <=4.0.2012 | |
Linux kernel | ||
Fortinet FortiClient Virtual Private Network | <=4.0.2 | |
Apple iOS and macOS | ||
Fortinet FortiClient | <=2.0 | |
Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4669 is classified as a medium severity vulnerability.
To mitigate CVE-2013-4669, update FortiClient to version 4.3.5.472 or higher.
CVE-2013-4669 affects FortiClient versions before 4.3.5.472 on Windows, Mac OS X, and Android, as well as FortiClient Lite versions before 4.3.4.461.
CVE-2013-4669 is a potential Man-In-The-Middle (MITM) vulnerability.
The recommended workaround for CVE-2013-4669 is to upgrade to the latest version of FortiClient.