First published: Wed Jul 07 2021(Updated: )
A UNIX symbolic link (Symlink) Following (CWE-61) vulnerability in FortiClient for MacOS may allow a local and unprivileged user to overwrite privileged shell scripts executed during the installation phase via escalating their privileges to root.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Forticlient | <=6.4.3 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-26089 is high, with a CVSS score of 7.8.
CVE-2021-26089 is a privilege escalation vulnerability in Fortinet FortiClient Network Access Control, allowing local attackers to escalate privileges on affected installations.
To exploit CVE-2021-26089, an attacker must first execute low-privileged code on the target system.
Fortinet FortiClient versions up to and including 6.4.3 on macOS are affected by CVE-2021-26089.
You can find more information about CVE-2021-26089 on the FortiGuard advisory and Zero Day Initiative advisories.