First published: Tue Feb 10 2015(Updated: )
The Endpoint Control protocol implementation in Fortinet FortiClient 5.2.3.091 for Android and 5.2.028 for iOS does not validate certificates, which makes it easier for man-in-the-middle attackers to spoof servers via a crafted certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Forticlient | =5.2.3.091 | |
Fortinet Forticlient | =5.2.028 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.