#VU56394 OS Command Injection in Fortinet FortiClient for Windows - CVE-2021-22127

 

#VU56394 OS Command Injection in Fortinet FortiClient for Windows - CVE-2021-22127

Published: September 8, 2021


Vulnerability identifier: #VU56394
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2021-22127
CWE-ID: CWE-78
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
Fortinet FortiClient for Windows
Software vendor:
Fortinet, Inc

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote unauthenticated attacker on the local network can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links