First published: Wed Dec 18 2024(Updated: )
A Cleartext Storage of Sensitive Information vulnerability [CWE-312] in FortiClient Windows and FortiClient Linux may permit a local authenticated user to retrieve VPN password via memory dump, due to JavaScript's garbage collector
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Linux | >=7.4.0<=7.4.2 | |
Fortinet FortiClient Linux | >=7.2.0<=7.2.7 | |
Fortinet FortiClient Linux | >=7.0 | |
Fortinet FortiClient | >=7.4.0<=7.4.1 | |
Fortinet FortiClient | >=7.2.0<=7.2.6 | |
Fortinet FortiClient | >=7.0.0<=7.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-278 is classified as medium due to the potential exposure of sensitive information.
To fix FG-IR-23-278, upgrade FortiClient Windows to version 7.4.2 or later, or FortiClient Linux to version 7.4.3 or later.
FG-IR-23-278 affects users of FortiClient Windows and FortiClient Linux versions prior to the specified fixed versions.
FG-IR-23-278 risks exposing VPN passwords stored in cleartext, which could be accessed by local authenticated users.
Currently, there are no official workarounds for FG-IR-23-278, and users are advised to upgrade to safe versions.