First published: Tue Apr 09 2024(Updated: )
An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow##an unauthenticated attacker to execute arbitrary code via tricking a FortiClientLinux user into visiting a malicious website.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Linux | =. | |
Fortinet FortiClient Linux | >=7.0.6<=7.0.10 | |
Fortinet FortiClient Linux | >=7.0.3<=7.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-087 is high due to its potential to allow arbitrary code execution.
To fix FG-IR-23-087, update FortiClientLinux to versions 7.2.1 or 7.0.11 or later.
Users of FortiClientLinux versions prior to 7.2.1 and specific 7.0.x versions are affected by FG-IR-23-087.
FG-IR-23-087 is categorized as a Code Injection vulnerability (CWE-94).
Yes, FG-IR-23-087 can be exploited remotely by tricking users into visiting malicious websites.