A relative path traversal vulnerability in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-22-320 | Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-22-320 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-22-320 - Vendor Advisory |
18 Apr 2023, 19:54
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://fortiguard.com/psirt/FG-IR-22-320 - Vendor Advisory | |
CPE | cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-22 | |
First Time |
Fortinet
Fortinet forticlient |
11 Apr 2023, 17:21
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-11 17:15
Updated : 2024-11-21 07:25
NVD link : CVE-2022-42470
Mitre link : CVE-2022-42470
CVE.ORG link : CVE-2022-42470
JSON object : View
Products Affected
fortinet
- forticlient