First published: Wed Nov 02 2022(Updated: )
An exposure of sensitive information to an unauthorized actor vulnerabiltiy [CWE-200] in FortiClient for Mac versions 7.0.0 through 7.0.5 may allow a local authenticated attacker to obtain the SSL-VPN password in cleartext via running a logstream for the FortiTray process in the terminal.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Forticlient | >=7.0.0<=7.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-33878.
The severity of CVE-2022-33878 is medium, with a severity value of 5.5.
FortiClient for Mac versions 7.0.0 through 7.0.5 are affected by CVE-2022-33878.
The CWE ID associated with CVE-2022-33878 is CWE-200.
A local authenticated attacker can obtain the SSL-VPN password in cleartext by running a logstream for the FortiTray process in the terminal.