First published: Wed Jul 07 2021(Updated: )
A UNIX symbolic link (Symlink) Following (CWE-61) vulnerability in FortiClient for MacOS may allow a local and unprivileged user to overwrite privileged shell scripts executed during the installation phase via escalating their privileges to root.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Virtual Private Network |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
FG-IR-21-022 is considered a moderate severity vulnerability due to its potential for privilege escalation.
To fix FG-IR-21-022, ensure you update FortiClient for MacOS to the latest version that addresses this symlink vulnerability.
FG-IR-21-022 affects local and unprivileged users of FortiClient for MacOS who can exploit the symlink vulnerability.
An attacker exploiting FG-IR-21-022 can overwrite privileged shell scripts during installation, potentially gaining root privileges.
Currently, the recommended approach for FG-IR-21-022 is to apply the software update rather than seeking workarounds.