First published: Mon Jul 18 2022(Updated: )
A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Windows | >=6.2.0<=6.2.9 | |
Fortinet FortiClient Windows | >=6.4.0<=6.4.6 | |
Fortinet FortiClient Windows | >=7.0.0<=7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-41031.
The severity of CVE-2021-41031 is high with a CVSS score of 7.8.
FortiClient for Windows versions 6.2.0 to 6.2.9, 6.4.0 to 6.4.6, and 7.0.0 to 7.0.2 are affected by CVE-2021-41031.
An attacker can exploit CVE-2021-41031 by leveraging a relative path traversal vulnerability in FortiClient for Windows to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service.
You can find more information about CVE-2021-41031 at the following reference link: https://fortiguard.com/advisory/FG-IR-21-190