First published: Wed Apr 06 2022(Updated: )
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient for Linux version 7.0.2 and below, 6.4.7 and below and 6.2.9 and below may allow an unauthenticated attacker to access the confighandler webserver via external binaries.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Forticlient | >=6.2.0<=6.2.4 | |
Fortinet Forticlient | >=6.2.6<=6.2.9 | |
Fortinet Forticlient | >=6.4.0<=6.4.4 | |
Fortinet Forticlient | >=7.0.0<=7.0.2 | |
Fortinet Forticlient | =6.4.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43205 is a vulnerability in FortiClient for Linux versions 7.0.2 and below, 6.4.7 and below, and 6.2.9 and below that exposes sensitive information to unauthorized actors.
CVE-2021-43205 has a severity score of 5.3 (medium).
An unauthenticated attacker can exploit CVE-2021-43205 by accessing the confighandler webserver via external binaries.
FortiClient for Linux versions 7.0.2 and below, 6.4.7 and below, and 6.2.9 and below are affected by CVE-2021-43205.
Yes, Fortinet has released patches to address the vulnerability. It is recommended to update to the latest version of FortiClient for Linux.