First published: Thu Nov 21 2019(Updated: )
An Improper Neutralization of Special Elements used in a Command vulnerability in one of FortiClient for Mac OS root processes, may allow a local user of the system on which FortiClient is running to execute unauthorized code as root by bypassing a security check.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Forticlient | <=6.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this FortiClient vulnerability is CVE-2019-17650.
The title of this vulnerability is 'An Improper Neutralization of Special Elements used in a Command vulnerability in one of FortiClient for Mac OS root processes'.
The description of this vulnerability is that a local user of the system on which FortiClient for Mac OS is running may be able to execute unauthorized code as root by bypassing a security check due to an improper neutralization of special elements used in a command.
The severity of CVE-2019-17650 is high with a CVSS score of 7.8.
To fix this vulnerability, you should update FortiClient for Mac OS to a version that is not affected by the vulnerability. Check with the vendor for the latest updates and patches.