First published: Sun Mar 15 2020(Updated: )
An Unsafe Search Path vulnerability in FortiClient for Windows online installer 6.2.3 and below may allow a local attacker with control over the directory in which FortiClientOnlineInstaller.exe and FortiClientVPNOnlineInstaller.exe resides to execute arbitrary code on the system via uploading malicious Filter Library DLL files in that directory.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Windows | <=6.2.3 | |
Fortinet Forticlient Virtual Private Network | <=6.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-9290 is high, with a CVSS score of 7.8.
CVE-2020-9290 affects FortiClient for Windows online installer version 6.2.3 and below.
CVE-2020-9290 affects FortiClient Virtual Private Network (VPN) online installer version 6.2.3 and below.
A local attacker with control over the directory where FortiClientOnlineInstaller.exe and FortiClientVPNOnlineInstaller.exe reside can upload malicious code to execute arbitrary code on the system.
Updating to a version of FortiClient for Windows online installer and FortiClient Virtual Private Network (VPN) online installer that is above version 6.2.3 can fix this vulnerability.