Vulnerabilities > Fortinet > Forticlient > 6.4.9

DATE CVE VULNERABILITY TITLE RISK
2025-01-14 CVE-2024-50564 Use of Hard-coded Credentials vulnerability in Fortinet Forticlient
A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.
local
low complexity
fortinet CWE-798
3.3
2024-11-13 CVE-2024-47574 Missing Authentication for Critical Function vulnerability in Fortinet Forticlient
A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.
local
low complexity
fortinet CWE-306
7.8
2024-11-12 CVE-2024-36513 Privilege Context Switching Error vulnerability in Fortinet Forticlient
A privilege context switching error vulnerability [CWE-270] in FortiClient Windows version 7.2.4 and below, version 7.0.12 and below, 6.4 all versions may allow an authenticated user to escalate their privileges via lua auto patch scripts.
local
low complexity
fortinet CWE-270
8.8
2024-09-10 CVE-2022-45856 Improper Certificate Validation vulnerability in Fortinet Forticlient
An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientAndroid 6.4 all versions, 7.0 all versions, 7.2.0 and FortiClientiOS 5.6 all versions, 6.0.0 through 6.0.1, 7.0.0 through 7.0.6 SAML SSO feature may allow an unauthenticated attacker to man-in-the-middle the communication between the FortiClient and  both the service provider and the identity provider.
network
high complexity
fortinet CWE-295
5.9
2024-05-06 CVE-2024-3661 Missing Authentication for Critical Function vulnerability in multiple products
DHCP can add routes to a client’s routing table via the classless static route option (121).
7.6
2023-10-10 CVE-2023-37939 Unspecified vulnerability in Fortinet Forticlient
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient for Windows 7.2.0, 7.0 all versions, 6.4 all versions, 6.2 all versions, Linux 7.2.0, 7.0 all versions, 6.4 all versions, 6.2 all versions and Mac 7.2.0 through 7.2.1, 7.0 all versions, 6.4 all versions, 6.2 all versions, may allow a local authenticated attacker with no Administrative privileges to retrieve the list of files or folders excluded from malware scanning.
local
low complexity
fortinet
3.3
2023-04-11 CVE-2022-40682 Incorrect Authorization vulnerability in Fortinet Forticlient
A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe.
local
low complexity
fortinet CWE-863
7.8
2023-04-11 CVE-2022-42470 Path Traversal vulnerability in Fortinet Forticlient
A relative path traversal vulnerability in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe.
local
low complexity
fortinet CWE-22
7.8
2023-04-11 CVE-2022-43946 Incorrect Permission Assignment for Critical Resource vulnerability in Fortinet Forticlient
Multiple vulnerabilities including an incorrect permission assignment for critical resource [CWE-732] vulnerability and a time-of-check time-of-use (TOCTOU) race condition [CWE-367] vulnerability in Fortinet FortiClientWindows before 7.0.7 allows attackers on the same file sharing network to execute commands via writing data into a windows pipe.
network
high complexity
fortinet CWE-732
8.1