Vulnerabilities > CVE-2018-9190 - NULL Pointer Dereference vulnerability in Fortinet Forticlient
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
A null pointer dereference vulnerability in Fortinet FortiClientWindows 6.0.2 and earlier allows attacker to cause a denial of service via the NDIS miniport driver.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Windows |
NASL id | FORTICLIENT_6_0_3.NASL |
description | The version of Fortinet FortiClient running on the remote host is prior to 6.0.3. It is, therefore, affected by a NULL pointer dereference flaw due to a failure to utilize necessary NULL checks before doing indirect function calls. An unauthenticated, local attacker can exploit this, via the NDIS Miniport drivers, to cause a denial of service condition when the application attempts to read or write memory with a NULL pointer. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 122858 |
published | 2019-03-14 |
reporter | This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/122858 |
title | Fortinet FortiClient NDIS Miniport Driver Null Pointer Dereference |