First published: Thu Dec 14 2017(Updated: )
A privilege escalation in Fortinet FortiClient Windows 5.4.3 and earlier as well as 5.6.0 allows attacker to gain privilege via exploiting the Windows "security alert" dialog thereby popping up when the "VPN before logon" feature is enabled and an untrusted certificate chain.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Windows | <=5.4.3 | |
Fortinet FortiClient Windows | =5.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-7344 is high with a CVSS score of 8.1.
The privilege escalation occurs when the 'VPN before logon' feature is enabled and an untrusted certificate chain is exploited, causing a Windows security alert dialog to pop up.
Fortinet FortiClient Windows 5.4.3 and earlier, as well as version 5.6.0, are affected by CVE-2017-7344.
An attacker can gain privilege by exploiting the Windows 'security alert' dialog triggered by the 'VPN before logon' feature and an untrusted certificate chain.
You can find more information about CVE-2017-7344 at the following references: [SecurityFocus](http://www.securityfocus.com/bid/102176), [Fortiguard Advisory](https://fortiguard.com/advisory/FG-IR-17-070), [Intrinsec](https://securite.intrinsec.com/2017/12/22/cve-2017-7344-fortinet-forticlient-windows-privilege-escalation-at-logon/).