An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
2020-06-01T19:15:10.190
2024-11-21T05:40:22.113
Modified
CVSSv3.1: 6.3 (MEDIUM)
AV:L/AC:L/Au:N/C:P/I:P/A:P
3.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | fortinet | forticlient | ≤ 6.0.9 | Yes |
Application | fortinet | forticlient | ≤ 6.2.1 | Yes |