First published: Thu Feb 06 2020(Updated: )
A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Forticlient | <=6.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15711 is a privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below.
CVE-2019-15711 may allow a user with low privilege to run system commands under root privilege via injecting specially crafted 'ExportLogs' type IPC client requests to the fctsched process.
CVE-2019-15711 has a severity score of 7.8, which is considered high.
FortiClient for Linux versions up to and including 6.2.1 are affected by CVE-2019-15711.
To fix CVE-2019-15711, it is recommended to update FortiClient for Linux to a version that is not affected by the vulnerability.