Fortinet FortiClient < 6.2.2 Information Disclosure MitM (FG-IR-18-100) (macOS)

Medium Nessus Plugin ID 131284


The remote macOS host is affected by an information disclosure vulnerability.


The remote macOS host is running a version of Fortinet FortiClient prior to 6.2.2. It is, therefore, affected by an information disclosure man-in-the-middle vulnerability in the FortiGuard services communication protocol due to the use of a hardcoded cryptographic key. A remote attacker with knowledge of the hardcoded key can exploit this via the network to eavesdrop and modify information sent and received from FortiGuard servers.


Upgrade to Fortinet FortiClient 6.2.2 or later.

See Also

Plugin Details

Severity: Medium

ID: 131284

File Name: macos_forticlient_6_2_2.nasl

Version: 1.3

Type: local

Agent: macosx

Published: 2019/11/25

Updated: 2019/11/27

Dependencies: 95259

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2018-9195

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 5.9

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:fortinet:forticlient

Required KB Items: installed_sw/FortiClient (macOS)

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2019/10/31

Vulnerability Publication Date: 2019/11/21

Reference Information

CVE: CVE-2018-9195