FortiClient privilege escalation vulnerability
Fortinet PSIRT Advisories
Fortinet PSIRT Contact:
Website: https://fortiguard.fortinet.com/faq/psirt-contact
FG-IR-16-095
Final
1
1
2017-10-31T00:00:00
Current version
2017-10-31T00:00:00
2017-10-31T00:00:00
A low privileged user may be able to execute arbitrary code by exploiting a FortiClientNamedPipe vulnerability.
A low privileged user may be able to execute arbitrary code by exploiting a FortiClientNamedPipe vulnerability.
Privilege escalation
FortiClientWindows 5.4.1, 5.4.2.
Upgrade to FortiClient Windows: 5.4.3 or 5.6.0
Fortinet is pleased to thank Zhipeng Huo from Tencent Technology Company Limited for reporting this vulnerability under responsible disclosure.
FortiClientWindows 5.4.2
FortiClientWindows 5.4.1
FortiClient privilege escalation vulnerability
CVE-2016-8493
FortiClientWindows-5.4.2
FortiClientWindows-5.4.1
6.2
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:F/RL:X/RC:X
https://fortiguard.fortinet.com/psirt/FG-IR-16-095
FortiClient privilege escalation vulnerability
Reference>