A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.
2021-12-16T19:15:08.130
2024-11-21T06:25:18.210
Modified
CVSSv3.1: 8.2 (HIGH)
AV:A/AC:M/Au:N/C:P/I:P/A:P
5.5
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | fortinet | forticlient | ≤ 6.0.9 | Yes |
Application | fortinet | forticlient | ≤ 6.0.9 | Yes |
Application | fortinet | forticlient | ≤ 6.2.9 | Yes |
Application | fortinet | forticlient | ≤ 6.2.9 | Yes |
Application | fortinet | forticlient | ≤ 6.2.9 | Yes |
Application | fortinet | forticlient | ≤ 6.4.6 | Yes |
Application | fortinet | forticlient | ≤ 6.4.6 | Yes |
Application | fortinet | forticlient | ≤ 6.4.6 | Yes |
Application | fortinet | forticlient | 7.0.0 | Yes |
Application | fortinet | forticlient | 7.0.0 | Yes |
Application | fortinet | forticlient | 7.0.0 | Yes |
Application | fortinet | forticlient | 7.0.1 | Yes |
Application | fortinet | forticlient | 7.0.1 | Yes |
Application | fortinet | forticlient | 7.0.1 | Yes |
Application | fortinet | forticlient_endpoint_management_server | ≤ 6.2.9 | Yes |
Application | fortinet | forticlient_endpoint_management_server | ≤ 6.4.6 | Yes |
Application | fortinet | forticlient_endpoint_management_server | 7.0.0 | Yes |
Application | fortinet | forticlient_endpoint_management_server | 7.0.1 | Yes |