First published: Thu May 30 2019(Updated: )
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attackers to execute unauthorized code or commands via the named pipe responsible for Forticlient updates.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Windows | <=6.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this FortiClient vulnerability is CVE-2018-9191.
The severity of CVE-2018-9191 is high with a severity value of 7.8.
Fortinet FortiClient for Windows 6.0.4 and earlier versions are affected by CVE-2018-9191.
Attackers can execute unauthorized code or commands via the named pipe responsible for Forticlient updates with CVE-2018-9191.
Yes, Fortinet has released a patch to address CVE-2018-9191. It is recommended to update to the latest version of Fortinet FortiClient for Windows to mitigate the vulnerability.