Vulnerabilities > Fortinet > Forticlient > 7.0.6

DATE CVE VULNERABILITY TITLE RISK
2025-01-14 CVE-2024-50564 Use of Hard-coded Credentials vulnerability in Fortinet Forticlient
A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.
local
low complexity
fortinet CWE-798
3.3
2024-11-13 CVE-2024-47574 Missing Authentication for Critical Function vulnerability in Fortinet Forticlient
A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.
local
low complexity
fortinet CWE-306
7.8
2024-11-12 CVE-2024-36507 Untrusted Search Path vulnerability in Fortinet Forticlient
A untrusted search path in Fortinet FortiClientWindows versions 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0 allows an attacker to run arbitrary code via DLL hijacking and social engineering.
local
low complexity
fortinet CWE-426
7.8
2024-11-12 CVE-2024-36513 Privilege Context Switching Error vulnerability in Fortinet Forticlient
A privilege context switching error vulnerability [CWE-270] in FortiClient Windows version 7.2.4 and below, version 7.0.12 and below, 6.4 all versions may allow an authenticated user to escalate their privileges via lua auto patch scripts.
local
low complexity
fortinet CWE-270
8.8
2024-09-10 CVE-2022-45856 Improper Certificate Validation vulnerability in Fortinet Forticlient
An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientAndroid 6.4 all versions, 7.0 all versions, 7.2.0 and FortiClientiOS 5.6 all versions, 6.0.0 through 6.0.1, 7.0.0 through 7.0.6 SAML SSO feature may allow an unauthenticated attacker to man-in-the-middle the communication between the FortiClient and  both the service provider and the identity provider.
network
high complexity
fortinet CWE-295
5.9
2024-09-10 CVE-2024-31489 Improper Certificate Validation vulnerability in Fortinet Forticlient
AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation
network
high complexity
fortinet CWE-295
8.1
2024-09-10 CVE-2024-35282 Cleartext Storage of Sensitive Information vulnerability in Fortinet Forticlient
A cleartext storage of sensitive information in memory vulnerability [CWE-316] affecting FortiClient VPN iOS 7.2 all versions, 7.0 all versions, 6.4 all versions, 6.2 all versions, 6.0 all versions may allow an unauthenticated attacker that has physical access to a jailbroken device to obtain cleartext passwords via keychain dump.
low complexity
fortinet CWE-312
4.6
2024-05-06 CVE-2024-3661 Missing Authentication for Critical Function vulnerability in multiple products
DHCP can add routes to a client’s routing table via the classless static route option (121).
7.6
2024-04-10 CVE-2024-31492 Unspecified vulnerability in Fortinet Forticlient
An external control of file name or path vulnerability [CWE-73] in FortiClientMac version 7.2.3 and below, version 7.0.10 and below installer may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file in /tmp before starting the installation process.
local
low complexity
fortinet
7.8
2024-04-09 CVE-2023-45590 Unspecified vulnerability in Fortinet Forticlient
An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website
network
low complexity
fortinet
8.8