#VU111049 Improper validation of certificate with host mismatch in Fortinet FortiClient for Windows - CVE-2024-54019


Vulnerability identifier: #VU111049

Vulnerability risk: Medium

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-54019

CWE-ID: CWE-297

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Fortinet FortiClient for Windows
Server applications / Other server solutions

Vendor: Fortinet, Inc

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The vulnerability exists due to improper validation of certificate with host mismatch. An unauthorized attacker can redirect VPN connections via DNS spoofing or another form of redirection.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Fortinet FortiClient for Windows: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.12, 7.0.13, 7.0.14, 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.8, 7.2.9, 7.2.10, 7.4.0, 7.4.2, 7.4.3


External links
https://www.fortiguard.com/psirt/FG-IR-24-365


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability