#VU22611 OS Command Injection in Fortinet FortiClient for Windows - CVE-2019-17650 

 

#VU22611 OS Command Injection in Fortinet FortiClient for Windows - CVE-2019-17650

Published: November 8, 2019


Vulnerability identifier: #VU22611
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/U:Clear
CVE-ID: CVE-2019-17650
CWE-ID: CWE-78
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Fortinet FortiClient for Windows
Software vendor:
Fortinet, Inc

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper input validation. A local user can execute arbitrary commands with root privileges on the system with running FortiClient for macOS.


Remediation

Install updates from vendor's website.

External links