First published: Tue Nov 12 2024(Updated: )
A untrusted search path in Fortinet FortiClientWindows versions 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0 allows an attacker to run arbitrary code via DLL hijacking and social engineering.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient SSL VPN | >=7.0.0<7.0.13 | |
Fortinet FortiClient SSL VPN | >=7.2.0<7.2.5 | |
Fortinet FortiClient SSL VPN | =7.4.0 |
Please upgrade to FortiClientWindows version 7.4.1 or above Please upgrade to FortiClientWindows version 7.2.5 or above Please upgrade to FortiClientWindows version 7.0.13 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36507 is considered a high severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2024-36507, upgrade Fortinet FortiClient to version 7.4.1 or later, and ensure that the application is not run with untrusted DLLs.
CVE-2024-36507 affects Fortinet FortiClient versions 7.0.0 to 7.0.12, 7.2.0 to 7.2.4, and 7.4.0.
CVE-2024-36507 enables attackers to execute arbitrary code through DLL hijacking combined with social engineering tactics.
Yes, CVE-2024-36507 allows for remote code execution when exploited via the untrusted search path in the affected FortiClient versions.