An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient for Linux 6.2.x before 6.2.9 may allow an unauthenticated attacker to execute arbitrary code on the host operating system as root via tricking the user into connecting to a network with a malicious name.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/advisory/FG-IR-20-241 |
![]() ![]() |
History
Fri, 25 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T13:32:52.692Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-22127

Updated: 2024-08-03T18:30:23.950Z

Status : Modified
Published: 2022-04-06T16:15:07.787
Modified: 2024-11-21T05:49:33.407
Link: CVE-2021-22127

No data.