A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-19-238 | Vendor Advisory |
https://danishcyberdefence.dk/blog/forticlient_linux | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-02-06 08:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-15711
Mitre link : CVE-2019-15711
JSON object : View
CWE
Products Affected
fortinet
- forticlient