Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-54019 |
CWE-ID | CWE-297 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Fortinet FortiClient for Windows Server applications / Other server solutions |
Vendor | Fortinet, Inc |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU111049
Risk: Medium
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-54019
CWE-ID:
CWE-297 - Improper Validation of Certificate with Host Mismatch
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper validation of certificate with host mismatch. An unauthorized attacker can redirect VPN connections via DNS spoofing or another form of redirection.
MitigationInstall update from vendor's website.
Vulnerable software versionsFortinet FortiClient for Windows: 7.0.0 - 7.4.3
CPE2.3https://www.fortiguard.com/psirt/FG-IR-24-365
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.