<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>NSS AEP: FortiClient Service or Process Tampering Disclosure</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-19-148</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2019-10-18T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2019-10-18T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2019-10-18T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            FortiClient for Windows could be subject to the following shut down or tampering attempts:a) User Interface or Command Line shut downBy default a privileged user can close the FortiClient for Windows program b) Service or Process shut downMalicious privileged programs can stop the FortiClient for Windows process via the taskkill commandc) Uninstall By default a privileged user can unintall the FortiClient for Windows program d) Code InjectionA component of FortiClient for Windows will search for a specific un-existing Windows Dynamic Link library when starting. A malicious and privileged program can forge that DLL, leading to arbitrary code execution.
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Execute unauthorized code or commands
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            a) User Interface or Command Line shut downFortiClient for Windows all versions under default configurations.b) Service or Process shut downFortiClient for Windows 6.2.1 and below versions.c) Uninstall FortiClient for Windows all versions under default configurations.d) Code Injection FortiClient for Windows 6.2.0 and below versions.All of the above require the malicious program or attacker to have the same or higher level of privilege as FortiClient.
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            a) User Interface or Command Line TamperingFortiClient for Windows supports disabling program-closing under both managed mode and standalone mode:o Managed mode: Enable the &#34;Disable Unregister&#34; setting in FortiClient EMSo Standalone mode: Enablethe &#34;Lock Settings&#34; setting in FortiClient consoleb) Service or Process shut downUpgrade to FortiClient for Windows 6.2.2c) Uninstall FortiClient for Windows supports disabling program uninstall under both managed mode and standalone mode:o Managed mode: Enable the &#34;Disable Unregister&#34; setting in FortiClient EMSo Standalone mode: Enable the &#34;Lock Settings&#34; setting in FortiClient consoled) Code Injection Upgrade to FortiClient for Windows 6.2.1Revision History:2019-07-25 Initial release2019-10-17 FortiClient for Windows 6.2.2 released to address issue b)
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:DocumentReferences>
        <cvrf:Reference>
            <cvrf:URL>https://fortiguard.fortinet.com/psirt/FG-IR-19-148</cvrf:URL>
            <cvrf:Description>NSS AEP: FortiClient Service or Process Tampering Disclosure</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://www.nsslabs.com/blog-posts/2019/7/24/your-advanced-endpoint-protection-aep-product-protects-your-computer-but-can-it-protect-itself</cvrf:URL>
            <cvrf:Description>https://www.nsslabs.com/blog-posts/2019/7/24/your-advanced-endpoint-protection-aep-product-protects-your-computer-but-can-it-protect-itself</cvrf:Description>
        </cvrf:Reference>
    </cvrf:DocumentReferences>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Fortinet is pleased to thank Edsel Valle - security researcher from NSS Labs for reporting this vulnerability under responsible disclosure.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <Vulnerability Ordinal="1">
        <Title>NSS AEP: FortiClient Service or Process Tampering Disclosure</Title>
        <cvrf:CVE>CVE-2019-6692</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>6.2</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:F/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-19-148</URL>
                <Description>NSS AEP: FortiClient Service or Process Tampering Disclosure</Description>
            </Reference>Reference>
            <Reference>
                <URL>https://www.nsslabs.com/blog-posts/2019/7/24/your-advanced-endpoint-protection-aep-product-protects-your-computer-but-can-it-protect-itself</URL>
                <Description>https://www.nsslabs.com/blog-posts/2019/7/24/your-advanced-endpoint-protection-aep-product-protects-your-computer-but-can-it-protect-itself</Description>
            </Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>