First published: Tue Apr 11 2023(Updated: )
A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Windows | >=6.0.0<=6.0.10 | |
Fortinet FortiClient Windows | >=6.2.0<=6.2.9 | |
Fortinet FortiClient Windows | >=6.4.0<=6.4.9 | |
Fortinet FortiClient Windows | >=7.0.0<7.0.8 |
Please upgrade to FortiClientWindows version 7.2.0 or above Please upgrade to FortiClientWindows version 7.0.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-40682.
The severity of CVE-2022-40682 is high with a CVSS score of 7.8.
Fortinet FortiClient (Windows) versions 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9, and 6.0.0 - 6.0.10 are affected by CVE-2022-40682.
An attacker can exploit CVE-2022-40682 by sending a crafted request to a specific named pipe, allowing them to execute unauthorized code or commands.
Yes, Fortinet has released a security advisory with steps to mitigate the vulnerability. Please refer to the Fortinet PSIRT advisory FG-IR-22-336 for more information.