First published: Thu Dec 09 2021(Updated: )
An improper authorization vulnerabiltiy [CWE-285] in FortiClient Windows versions 7.0.0 and 6.4.6 and below and 6.2.8 and below may allow an unauthenticated attacker to bypass the webfilter control via modifying the session-id paramater.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Windows | >=6.4.0<=6.4.6 | |
Fortinet FortiClient Windows | =6.2.7 | |
Fortinet FortiClient Windows | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-36167.
CVE-2021-36167 has a severity rating of 5.3, which is considered medium.
FortiClient Windows versions 7.0.0, 6.4.6 and below, and 6.2.8 and below are affected by CVE-2021-36167.
An unauthenticated attacker can exploit CVE-2021-36167 by modifying the session-id parameter to bypass the webfilter control in FortiClient Windows.
Yes, Fortinet has released patches to address the vulnerability. It is recommended to update FortiClient Windows to the latest version.