Vulnerabilities > Fortinet > Forticlient > High

DATE CVE VULNERABILITY TITLE RISK
2024-11-12 CVE-2024-36507 Untrusted Search Path vulnerability in Fortinet Forticlient
A untrusted search path in Fortinet FortiClientWindows versions 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0 allows an attacker to run arbitrary code via DLL hijacking and social engineering.
local
low complexity
fortinet CWE-426
7.8
2024-11-12 CVE-2024-36513 Privilege Context Switching Error vulnerability in Fortinet Forticlient
A privilege context switching error vulnerability [CWE-270] in FortiClient Windows version 7.2.4 and below, version 7.0.12 and below, 6.4 all versions may allow an authenticated user to escalate their privileges via lua auto patch scripts.
local
low complexity
fortinet CWE-270
8.8
2024-09-10 CVE-2024-31489 Improper Certificate Validation vulnerability in Fortinet Forticlient
AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation
network
high complexity
fortinet CWE-295
8.1
2023-11-14 CVE-2022-40681 Incorrect Authorization vulnerability in Fortinet Forticlient
A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to cause denial of service via sending a crafted request to a specific named pipe.
local
low complexity
fortinet CWE-863
7.1
2023-11-14 CVE-2023-41840 Untrusted Search Path vulnerability in Fortinet Forticlient 7.0.9/7.2.0/7.2.1
A untrusted search path vulnerability in Fortinet FortiClientWindows 7.0.9 allows an attacker to perform a DLL Hijack attack via a malicious OpenSSL engine library in the search path.
local
low complexity
fortinet CWE-426
7.8
2023-04-11 CVE-2022-40682 Incorrect Authorization vulnerability in Fortinet Forticlient
A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe.
local
low complexity
fortinet CWE-863
7.8
2023-04-11 CVE-2022-42470 Path Traversal vulnerability in Fortinet Forticlient
A relative path traversal vulnerability in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe.
local
low complexity
fortinet CWE-22
7.8
2023-04-11 CVE-2022-43946 Incorrect Permission Assignment for Critical Resource vulnerability in Fortinet Forticlient
Multiple vulnerabilities including an incorrect permission assignment for critical resource [CWE-732] vulnerability and a time-of-check time-of-use (TOCTOU) race condition [CWE-367] vulnerability in Fortinet FortiClientWindows before 7.0.7 allows attackers on the same file sharing network to execute commands via writing data into a windows pipe.
network
high complexity
fortinet CWE-732
8.1
2023-04-11 CVE-2023-22635 Download of Code Without Integrity Check vulnerability in Fortinet Forticlient
A download of code without Integrity check vulnerability [CWE-494] in FortiClientMac version 7.0.0 through 7.0.7, 6.4 all versions, 6.2 all versions, 6.0 all versions, 5.6 all versions, 5.4 all versions, 5.2 all versions, 5.0 all versions and 4.0 all versions may allow a local attacker to escalate their privileges via modifying the installer upon upgrade.
local
low complexity
fortinet CWE-494
7.8
2022-04-06 CVE-2021-22127 OS Command Injection vulnerability in Fortinet Forticlient
An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient for Linux 6.2.x before 6.2.9 may allow an unauthenticated attacker to execute arbitrary code on the host operating system as root via tricking the user into connecting to a network with a malicious name.
7.9