First published: Tue Apr 11 2023(Updated: )
Multiple vulnerabilities including an incorrect permission assignment for critical resource [CWE-732] vulnerability and a time-of-check time-of-use (TOCTOU) race condition [CWE-367] vulnerability in Fortinet FortiClientWindows before 7.0.7 allows attackers on the same file sharing network to execute commands via writing data into a windows pipe.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Windows | >=6.0.0<7.0.8 |
Please upgrade to FortiClientWindows version 7.2.0 or above Please upgrade to FortiClientWindows version 7.0.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43946 is a vulnerability in Fortinet FortiClientWindows before version 7.0.7 that allows attackers on the same file sharing network to execute arbitrary code via a time-of-check time-of-use (TOCTOU) race condition.
The severity of CVE-2022-43946 is rated as high with a CVSS score of 8.1.
CVE-2022-43946 affects Fortinet FortiClientWindows before version 7.0.7 by allowing attackers on the same file sharing network to execute arbitrary code.
To fix CVE-2022-43946, update Fortinet FortiClientWindows to version 7.0.7 or later.
Yes, you can find more information about CVE-2022-43946 at the Fortinet FortiGuard Advisory website: https://fortiguard.com/psirt/FG-IR-22-429