CVE-2019-15711

A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*

History

21 Nov 2024, 04:29

Type Values Removed Values Added
References () https://danishcyberdefence.dk/blog/forticlient_linux - Exploit, Third Party Advisory () https://danishcyberdefence.dk/blog/forticlient_linux - Exploit, Third Party Advisory
References () https://fortiguard.com/psirt/FG-IR-19-238 - Vendor Advisory () https://fortiguard.com/psirt/FG-IR-19-238 - Vendor Advisory

Information

Published : 2020-02-06 16:15

Updated : 2024-11-21 04:29


NVD link : CVE-2019-15711

Mitre link : CVE-2019-15711

CVE.ORG link : CVE-2019-15711


JSON object : View

Products Affected

fortinet

  • forticlient