First published: Tue Apr 09 2024(Updated: )
An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Linux | =. | |
Fortinet FortiClient Linux | >=7.0.6<=7.0.10 | |
Fortinet FortiClient Linux | >=7.0.3<=7.0.4 | |
Fortinet FortiClient | >=7.0.6<7.0.11 | |
Fortinet FortiClient | =7.0.3 | |
Fortinet FortiClient | =7.0.4 | |
Fortinet FortiClient | =7.2.0 |
Please upgrade to FortiClientLinux version 7.2.1 or above Please upgrade to FortiClientLinux version 7.0.11 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45590 has been classified with a critical severity due to its potential for arbitrary code execution.
To fix CVE-2023-45590, update FortiClientLinux to version 7.2.1 or 7.0.11 or later.
Affected versions include FortiClientLinux 7.2.0, 7.0.6 to 7.0.10, and 7.0.3 to 7.0.4.
CVE-2023-45590 is a code injection vulnerability that allows attackers to execute unauthorized commands.
An attacker can exploit CVE-2023-45590 by tricking a user into visiting a malicious website that leads to code execution.