- Description
- An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website
- Source
- psirt@fortinet.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- psirt@fortinet.com
- CWE-94
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*",
"vulnerable": true,
"matchCriteriaId": "0A39CBD1-AAF7-4423-AA29-840CF0DBFD6E",
"versionEndExcluding": "7.0.11",
"versionStartIncluding": "7.0.6"
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:7.0.3:*:*:*:*:linux:*:*",
"vulnerable": true,
"matchCriteriaId": "14320E4A-2445-4930-A8D1-B768B7294B36"
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:7.0.4:*:*:*:*:linux:*:*",
"vulnerable": true,
"matchCriteriaId": "56EE5E2F-CB22-4294-9AA9-DDB344494D9B"
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:linux:*:*",
"vulnerable": true,
"matchCriteriaId": "88271718-0DD4-4717-B403-1B44E2E56C91"
}
],
"operator": "OR"
}
]
}
]