<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>FortiClient/FortiClientVPN/FortiClientEMS Online Installer DLL Hijacking Vulnerability</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-19-060</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2020-03-09T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2020-03-09T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2020-03-09T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            Multiple unsafe search path vulnerabilities in FortiClient online installers may allow an attacker with control over the directory in which the installers reside to execute arbitrary code on the system via uploading malicious .dll files in that directory.
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Execute unauthorized code or commands
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiClientOnlineInstaller.exe for FortiClient for Windows 6.0.5 and below, 5.6 all versions (CVE-2019-5589)FortiClientOnlineInstaller.exe for FortiClient for Windows 6.4.6 and below, and 7.0.0 (CVE-2020-9290)FortiClientVPNOnlineInstaller.exe for FortiClient VPN for Windows 6.4.6 and below, and 7.0.0 (CVE-2020-9290)FortiClientEMSOnlineInstaller.exe for FortiClient EMS 6.0 all versions, 6.2.8 and below, 6.4.6 and below and 7.0.0 (CVE-2020-9287)
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            CVE-2019-5589: Use FortiClient for Windows online installer 6.0.6 or aboveCVE-2020-9290: Use FortiClient for Windows online installer 6.4.7 or above, 7.0.1 or above, and FortiClient VPN for Windows online installer 6.4.7 or above, 7.0.1 or aboveCVE-2020-9287: Use FortiClient EMS online installer 6.2.9 or above, 6.4.7 or above, 7.0.1 or above.Revision History:05-16-2019 Initial version3-09-2020 add CVE-2020-9290 and CVE-2020-928713-9-2021 modified CVE-2020-92908-11-2021 add CVE-2020-9290 and CVE-2020-9287
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Fortinet is pleased to thank Independent security researcher Honc (honcbb@gmail.com)for reporting CVE-2019-5589 and CVE-2020-9290, Houjingyi (houjingyi647@gmail.com) for reporting CVE-2020-9290 and CVE-2020-9287, security researcher Eran Shimony from CyberArk Labs for reporting CVE-2020-9290 and independent researcher Ameen Basha for reporting CVE-2020-9290 under responsible disclosures.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <Vulnerability Ordinal="1">
        <Title>FortiClient/FortiClientVPN/FortiClientEMS Online Installer DLL Hijacking Vulnerability</Title>
        <cvrf:CVE>CVE-2019-5589</cvrf:CVE>
        <cvrf:CVE>CVE-2020-9287</cvrf:CVE>
        <cvrf:CVE>CVE-2020-9290</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>8.6</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-19-060</URL>
                <Description>FortiClient/FortiClientVPN/FortiClientEMS Online Installer DLL Hijacking Vulnerability</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>