FortiClient - Lack of client-side certificate validation in ZTNA service
Summary
An improper certificate validation vulnerability [CWE-295] in FortiClientWindows, FortiClientLinux and FortiClientMac may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation
| Version | Affected | Solution |
|---|---|---|
| FortiClientLinux 7.4 | Not affected | Not Applicable |
| FortiClientLinux 7.2 | 7.2.0 | Upgrade to 7.2.1 or above |
| FortiClientLinux 7.0 | 7.0.0 through 7.0.11 | Upgrade to 7.0.12 or above |
| FortiClientLinux 6.4 | Not affected | Not Applicable |
| FortiClientMac 7.4 | Not affected | Not Applicable |
| FortiClientMac 7.2 | 7.2.0 through 7.2.4 | Upgrade to 7.2.5 or above |
| FortiClientMac 7.0 | 7.0.0 through 7.0.11 | Upgrade to 7.0.12 or above |
| FortiClientMac 6.4 | Not affected | Not Applicable |
| FortiClientWindows 7.4 | Not affected | Not Applicable |
| FortiClientWindows 7.2 | 7.2.0 through 7.2.2 | Upgrade to 7.2.3 or above |
| FortiClientWindows 7.0 | 7.0.0 through 7.0.11 | Upgrade to 7.0.12 or above |
| FortiClientWindows 6.4 | Not affected | Not Applicable |