CVE-2024-47574

A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*
cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:*
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*

History

21 Jan 2025, 22:21

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://fortiguard.fortinet.com/psirt/FG-IR-24-199 - () https://fortiguard.fortinet.com/psirt/FG-IR-24-199 - Vendor Advisory
First Time Fortinet
Fortinet forticlient
CWE CWE-288 CWE-306
CPE cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*
cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:*

13 Nov 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-13 12:15

Updated : 2025-01-21 22:21


NVD link : CVE-2024-47574

Mitre link : CVE-2024-47574


JSON object : View

Products Affected

fortinet

  • forticlient
CWE
CWE-306

Missing Authentication for Critical Function