Skip to main content

Fortinet Products Multiple Vulnerabilities

Release Date: 11 Sep 2024 3969 Views

RISK: Medium Risk

TYPE: Operating Systems - Networks OS

TYPE: Networks OS

Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger sensitive information disclosure, remote code execution and data manipulation on the targeted system.


Impact

  • Information Disclosure
  • Data Manipulation
  • Remote Code Execution

System / Technologies affected

  • FortiClientAndroid 5.0 all versions
  • FortiClientAndroid 5.2 all versions
  • FortiClientAndroid 5.4 all versions
  • FortiClientAndroid 5.6 all versions
  • FortiClientAndroid 6.0 all versions
  • FortiClientAndroid 6.4 all versions
  • FortiClientAndroid 7.0 all versions
  • FortiClientAndroid version 7.2.0
  • FortiClientEMS versions 1.2.2 through 1.2.5
  • FortiClientEMS 6.0 all versions
  • FortiClientEMS 6.2 all versions
  • FortiClientEMS 6.4 all versions
  • FortiClientEMS 7.0 all versions
  • FortiClientEMS versions 7.2.0 through 7.2.4
  • FortiClientEMS Cloud versions 7.0.0 through 7.0.12
  • FortiClientEMS Cloud versions 7.2.0 through 7.2.4
  • FortiClientiOS 2.0 all versions
  • FortiClientiOS 4.0 all versions
  • FortiClientiOS 5.0 all versions
  • FortiClientiOS 5.2 all versions
  • FortiClientiOS 5.4 all versions
  • FortiClientiOS 5.6 all versions
  • FortiClientiOS 6.0 all versions
  • FortiClientiOS 6.2 all versions
  • FortiClientiOS 6.4 all versions
  • FortiClientiOS 7.0 all versions
  • FortiClientiOS 7.2 all versions
  • FortiClientLinux 6.4 all versions
  • FortiClientLinux 7.0 all versions
  • FortiClientLinux versions 7.2.0 through 7.2.4
  • FortiClientMac 6.4 all versions
  • FortiClientMac 7.0 all versions
  • FortiClientMac versions 7.2.0 through 7.2.4
  • FortiClientWindows 6.4 all versions
  • FortiClientWindows versions 7.0.0 through 7.0.11
  • FortiClientWindows versions 7.2.0 through 7.2.2

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link