Fortinet FortiClient 6.2.x < 6.2.1 Missing Encryption Of Sensitive Data Vulnerability (macOS)

high Nessus Plugin ID 125404

Synopsis

The remote MacOS is affected by a denial of service vulnerability.

Description

The version of Fortinet FortiClient Mac running on the remote host is prior to 6.2.1. It is, therefore, affected by a missing encryption of sensitive data vulnerability. An attacker can access VPN session cookie from an endpoint device running FortiClient. The attacker can steal the cookies only if endpoint device has been compromised in such a way that the attacker has access to FortiClient's debug logs or memory space. Furthermore, practical use of the stolen cookie requires the attacker to spoof the endpoint's IP address.

Solution

Upgrade to Fortinet FortiClient 6.2.1 or later.

See Also

https://fortiguard.com/psirt/FG-IR-19-110

Plugin Details

Severity: High

ID: 125404

File Name: macos_forticlient_6_2_1.nasl

Version: 1.1

Type: local

Agent: macosx

Published: 5/28/2019

Updated: 5/28/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS Score Rationale: Based on analysis of vendor advisory.

CVSS v2

Risk Factor: Medium

Base Score: 6

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS Score Source: manual

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:fortinet:forticlient

Required KB Items: installed_sw/FortiClient (macOS)

Patch Publication Date: 4/23/2019

Vulnerability Publication Date: 4/23/2019