First published: Tue Sep 10 2024(Updated: )
A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiClientEMS versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.13, 6.4.0 through 6.4.9, 6.2.0 through 6.2.9, 6.0.0 through 6.0.8, 1.2.1 through 1.2.5 allows attacker to perform a denial of service, read or write a limited number of files via specially crafted HTTP requests
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient | >=1.2.1<=1.2.5 | |
Fortinet FortiClient | >=6.0.0<=6.0.8 | |
Fortinet FortiClient | >=6.2.0<=6.2.9 | |
Fortinet FortiClient | >=6.4.0<=6.4.9 | |
Fortinet FortiClient | >=7.0.0<=7.0.13 | |
Fortinet FortiClient | >=7.2.0<=7.2.4 |
Please upgrade to FortiClientEMS version 7.4.0 or above Please upgrade to FortiClientEMS version 7.2.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21753 is classified as a high severity vulnerability due to its potential to cause denial of service and unauthorized file access.
To fix CVE-2024-21753, upgrade Fortinet FortiClientEMS to the latest version that is not vulnerable, specifically versions after 7.2.4, 7.0.13, 6.4.9, 6.2.9, and 6.0.8.
CVE-2024-21753 allows an attacker to exploit path traversal vulnerabilities, potentially leading to denial of service or unauthorized access to sensitive files.
Fortinet FortiClientEMS versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.13, 6.4.0 through 6.4.9, 6.2.0 through 6.2.9, 6.0.0 through 6.0.8, and 1.2.1 through 1.2.5 are affected by CVE-2024-21753.
While specific exploits for CVE-2024-21753 have not been publicly disclosed, the nature of the vulnerability suggests it could be targeted by attackers to gain access or disrupt service.