First published: Wed Nov 13 2024(Updated: )
A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient SSL VPN | >=6.4.0<7.0.13 | |
Fortinet FortiClient SSL VPN | >=7.2.0<7.2.5 | |
Fortinet FortiClient SSL VPN | =7.4.0 | |
Fortinet FortiClient Virtual Private Network | =7.4.0>=7.2.0<=7.2.4>=7.0.0<=7.0.12>=6.4.0<=6.4.10 |
Please upgrade to FortiClientWindows version 7.4.1 or above Please upgrade to FortiClientWindows version 7.2.5 or above Please upgrade to FortiClientWindows version 7.0.13 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47574 is categorized as a high-severity vulnerability due to the potential for arbitrary code execution with high privileges.
To fix CVE-2024-47574, users should update their Fortinet FortiClient to the latest version that addresses this vulnerability.
CVE-2024-47574 affects users running Fortinet FortiClient versions 7.4.0, 7.2.4 down to 7.2.0, 7.0.12 down to 7.0.0, and 6.4.10 down to 6.4.0.
CVE-2024-47574 is an authentication bypass vulnerability that allows low privilege attackers to execute arbitrary code.
Attackers exploiting CVE-2024-47574 can execute arbitrary code with high privileges through spoofed named pipe messages.