A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| fortinet | forticlient | 6.0.0 - 6.0.9 | - |
| fortinet | forticlient | 6.0.0 - 6.0.9 | - |
| fortinet | forticlient | 6.2.0 - 6.2.9 |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H
18
Affected Products
2
References
fortinet / forticlient
| - |
| fortinet | forticlient | 6.2.0 - 6.2.9 | - |
| fortinet | forticlient | 6.2.0 - 6.2.9 | - |
| fortinet | forticlient | 6.4.0 - 6.4.6 | - |
| fortinet | forticlient | 6.4.0 - 6.4.6 | - |
| fortinet | forticlient | 6.4.0 - 6.4.6 | - |
| fortinet | forticlient | - | - |
| fortinet | forticlient | - | - |
| fortinet | forticlient | - | - |
| fortinet | forticlient | - | - |
| fortinet | forticlient | - | - |
| fortinet | forticlient | - | - |
| fortinet | forticlient_endpoint_management_server | 6.2.0 - 6.2.9 | - |
| fortinet | forticlient_endpoint_management_server | 6.4.0 - 6.4.6 | - |
| fortinet | forticlient_endpoint_management_server | - | - |
| fortinet | forticlient_endpoint_management_server | - | - |
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H
Exploitability
Impact