First published: Tue Sep 10 2024(Updated: )
An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientAndroid 6.4 all versions, 7.0 all versions, 7.2.0 and FortiClientiOS 5.6 all versions, 6.0.0 through 6.0.1, 7.0.0 through 7.0.6 SAML SSO feature may allow an unauthenticated attacker to man-in-the-middle the communication between the FortiClient and both the service provider and the identity provider.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Forticlient | >=5.0<7.2.1 | |
Fortinet Forticlient | >=6.4<7.2.5 | |
Fortinet Forticlient Mac Os | >=6.4<7.2.5 | |
Fortinet FortiClient Windows | >=6.4<7.0.8 | |
Fortinet Forticlient | >=2.0<7.0.7 |
Please upgrade to FortiClientAndroid version 7.2.1 or above Please upgrade to FortiClientiOS version 7.0.7 or above Please upgrade to FortiClientMac version 7.4.0 or above Please upgrade to FortiClientMac version 7.2.5 or above Please upgrade to FortiClientLinux version 7.4.0 or above Please upgrade to FortiClientLinux version 7.2.5 or above Please upgrade to FortiClientWindows version 7.2.0 or above Please upgrade to FortiClientWindows version 7.0.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.