Fortinet FortiClient 7.0.13 for Linux

CPE Details

Fortinet FortiClient 7.0.13 for Linux
7.0.13
2024-11-20
19h00 +00:00
2024-11-20
19h00 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:fortinet:forticlient:7.0.13:*:*:*:*:linux:*:*

Informations

Vendor

fortinet

Product

forticlient

Version

7.0.13

Target Software

linux

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-45856 2024-09-10 14h37 +00:00 An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientAndroid 6.4 all versions, 7.0 all versions, 7.2.0 and FortiClientiOS 5.6 all versions, 6.0.0 through 6.0.1, 7.0.0 through 7.0.6 SAML SSO feature may allow an unauthenticated attacker to man-in-the-middle the communication between the FortiClient and  both the service provider and the identity provider.
5.9
Moyen
CVE-2024-3661 2024-05-06 18h31 +00:00 DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
7.6
Haute