First published: Tue Nov 14 2023(Updated: )
A untrusted search path vulnerability in Fortinet FortiClientWindows 7.0.9 allows an attacker to perform a DLL Hijack attack via a malicious OpenSSL engine library in the search path.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Windows | =7.0.9 | |
Fortinet FortiClient Windows | =7.2.0 | |
Fortinet FortiClient Windows | =7.2.1 |
Please upgrade to FortiClientWindows version 7.2.2 or above Please upgrade to FortiClientWindows version 7.0.10 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-41840.
The title of the vulnerability is 'A untrusted search path vulnerability in Fortinet FortiClientWindows 7.0.9 allows an attacker to per…'
The vulnerability is a untrusted search path vulnerability in Fortinet FortiClientWindows 7.0.9 that allows an attacker to perform a DLL Hijack attack via a malicious OpenSSL engine library in the search path.
The vulnerability affects Fortinet FortiClient versions 7.0.9, 7.2.0, and 7.2.1 on Windows.
The severity of the vulnerability is high with a CVSS score of 7.4.
To fix the vulnerability, it is recommended to update Fortinet FortiClient to a version that is not affected by the issue.
You can find more information about the vulnerability on the Fortinet FortiGuard website: https://fortiguard.com/psirt/FG-IR-23-274
The CWE ID of the vulnerability is 426.