- Description
- A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.
- Source
- psirt@fortinet.com
- NVD status
- Analyzed
- Products
- forticlient
CVSS 3.1
- Type
- Primary
- Base score
- 3.3
- Impact score
- 1.4
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- Severity
- LOW
- Hype score
- Not currently trending
CVE-2024-50564 A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-pri… https://t.co/aUUyQGARv2
@CVEnew
14 Jan 2025
89 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Fortinet fixes FortiClient VPN Flaw CVE-2024-47574 #Fortinet #FortiClient #CVE-2024-47574 #CVE-2024-50564 https://t.co/Y2V1WER5LW
@pravin_karthik
15 Nov 2024
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "82E4143C-57CE-40F5-BBBE-F82B89153749",
"versionEndExcluding": "7.2.9",
"versionStartIncluding": "6.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:*",
"matchCriteriaId": "6B512696-8596-4458-ADC9-24DD3C6C377B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]