A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
Metrics
Affected Vendors & Products
References
History
Fri, 25 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T14:27:08.060Z
Reserved: 2019-08-27T00:00:00
Link: CVE-2019-15711

Updated: 2024-08-05T00:56:22.368Z

Status : Modified
Published: 2020-02-06T16:15:12.213
Modified: 2024-11-21T04:29:18.347
Link: CVE-2019-15711

No data.