Fortinet FortiClient Local Privilege Escalation

high Nessus Plugin ID 123009

Synopsis

The remote Windows host is affected by multiple vulnerabilities that can lead to privilege escalation.

Description

The version of Fortinet FortiClient running on the remote host is prior to 6.0.5. It is, therefore, affected by a privilege escalation vulnerability. An unauthenticated, remote attacker can exploit this to gain privileged or administrator access to the system.

Solution

Upgrade to Fortinet FortiClient 6.0.5 or later.

See Also

https://fortiguard.com/psirt/FG-IR-18-108

Plugin Details

Severity: High

ID: 123009

File Name: forticlient_6_0_5.nasl

Version: 1.1

Type: local

Agent: windows

Family: Windows

Published: 3/22/2019

Updated: 3/22/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS Score Rationale: Based on analysis of vendor advisory.

CVSS v2

Risk Factor: High

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: manual

CVSS v3

Risk Factor: High

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:fortinet:forticlient

Required KB Items: SMB/Registry/Enumerated, installed_sw/FortiClient

Patch Publication Date: 12/22/2018

Vulnerability Publication Date: 12/22/2018