Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
It is advised that all customers update their Vulnerability Scan engine to v2.00027 or later to protect against this vulnerability. In FortiClient -> About -> Engines -> Vulnerability, ensure version is 2.00027 or greater. The engine update will be pushed automatically to all FortiClients. Upgrade to FortiClient 6.0.5.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-20790 | A researcher has disclosed several vulnerabilities against FortiClient for Windows version 6.0.5 and below, version 5.6.6, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows. |
| Link | Providers |
|---|---|
| https://fortiguard.com/advisory/FG-IR-18-108 |
|
Mon, 24 Mar 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attacker to execute unauthorized code or commands via the parsing of the file. | A researcher has disclosed several vulnerabilities against FortiClient for Windows version 6.0.5 and below, version 5.6.6, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows. |
| Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-03-24T15:43:31.634Z
Reserved: 2018-04-02T00:00:00.000Z
Link: CVE-2018-9193
Updated: 2024-08-05T07:17:51.468Z
Status : Modified
Published: 2019-05-30T17:29:00.340
Modified: 2025-03-24T16:15:15.103
Link: CVE-2018-9193
No data.
OpenCVE Enrichment
No data.
EUVD