First published: Tue Nov 12 2024(Updated: )
A privilege context switching error vulnerability [CWE-270] in FortiClient Windows version 7.2.4 and below, version 7.0.12 and below, 6.4 all versions may allow an authenticated user to escalate their privileges via lua auto patch scripts.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient SSL VPN | >=6.4.0<=6.4.10 | |
Fortinet FortiClient SSL VPN | >=7.0.0<7.0.13 | |
Fortinet FortiClient SSL VPN | >=7.2.0<7.2.5 |
Please upgrade to FortiClientWindows version 7.4.0 or above Please upgrade to FortiClientWindows version 7.2.5 or above Please upgrade to FortiClientWindows version 7.0.13 or above Please upgrade to FortiClientWindows version 6.4.11 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36513 is considered a medium severity vulnerability that can lead to privilege escalation.
To fix CVE-2024-36513, update your FortiClient Windows version to 7.2.5 or later, 7.0.13 or later, or 6.4.10 or later.
CVE-2024-36513 affects FortiClient Windows versions 7.2.4 and below, 7.0.12 and below, and all versions of 6.4.
CVE-2024-36513 requires authentication, meaning an attacker must have valid credentials to exploit this vulnerability.
CVE-2024-36513 can be exploited to allow authenticated users to escalate their privileges, potentially leading to unauthorized actions on the system.