Unencrypted keychain permanent password

Summary

A cleartext storage of sensitive information in memory vulnerability [CWE-316] affecting FortiClient VPN iOS may allow an unauthenticated attacker that has physical access to a jailbroken device to obtain cleartext passwords via keychain dump.

Version Affected Solution
FortiClientiOS 7.4 Not affected Not Applicable
FortiClientiOS 7.2 7.2 all versions Migrate to a fixed release
FortiClientiOS 7.0 7.0 all versions Migrate to a fixed release
FortiClientiOS 6.4 6.4 all versions Migrate to a fixed release
FortiClientiOS 6.2 6.2 all versions Migrate to a fixed release
FortiClientiOS 6.0 6.0 all versions Migrate to a fixed release

Acknowledgement

Fortinet is pleased to thank Sanjeev Sinha, formerly of Walmart Global Tech for bringing this issue to our attention under responsible disclosure.

Timeline

2024-09-10: Initial publication