First published: Mon May 25 2020(Updated: )
An Insecure Temporary File (CWE-377) vulnerability in FortiClient for Windows may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Virtual Private Network |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-20-040 is considered high due to the potential for local users to gain elevated privileges.
To fix FG-IR-20-040, ensure you apply the latest security updates provided by Fortinet for FortiClient.
FG-IR-20-040 affects users of FortiClient for Windows, specifically those who may be exposed to local user attacks.
FG-IR-20-040 is classified as an Insecure Temporary File vulnerability under CWE-377.
Yes, if exploited, FG-IR-20-040 could potentially lead to data breaches due to elevated privileges obtained by local users.