First published: Thu Sep 03 2015(Updated: )
The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, (4) mdare64_52.sys, and (5) Fortishield.sys drivers in Fortinet FortiClient before 5.2.4 do not properly restrict access to the API for management of processes and the Windows registry, which allows local users to obtain a privileged handle to a PID and possibly have unspecified other impact, as demonstrated by a 0x2220c8 ioctl call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Virtual Private Network | <=5.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5737 is rated as a high severity vulnerability due to its potential to allow local users elevated privileges.
To fix CVE-2015-5737, update Fortinet FortiClient to version 5.2.4 or later.
CVE-2015-5737 is associated with vulnerabilities in the Fortinet FortiClient drivers that improperly restrict access to process and registry management APIs.
Any local user on systems running Fortinet FortiClient versions up to 5.2.3 is potentially affected by CVE-2015-5737.
The potential impacts of CVE-2015-5737 include unauthorized access to sensitive system processes and the Windows registry.