First published: Fri Mar 14 2025(Updated: )
An external control of file name or path vulnerability [CWE-73] in FortiClientMac version 7.2.3 and below, version 7.0.10 and below installer may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file in /tmp before starting the installation process.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient | <=7.2.3<=7.0.10 |
Please upgrade to FortiClientMac version 7.2.4 or above Please upgrade to FortiClientMac version 7.0.11 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45588 is considered a high-severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2023-45588, upgrade FortiClientMac to version 7.2.4 or later, or 7.0.11 or later.
CVE-2023-45588 affects users of FortiClientMac versions 7.2.3 and below, as well as 7.0.10 and below.
CVE-2023-45588 is an external control of file name or path vulnerability, classified under CWE-73.
CVE-2023-45588 requires local access for exploitation, as it involves manipulating configuration files before installation.