A researcher has disclosed several vulnerabilities against FortiClient for Windows version 6.0.5 and below, version 5.6.6, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows.
History

Mon, 24 Mar 2025 16:00:00 +0000

Type Values Removed Values Added
Description A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attacker to execute unauthorized code or commands via the parsing of the file. A researcher has disclosed several vulnerabilities against FortiClient for Windows version 6.0.5 and below, version 5.6.6, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows.
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:X/RC:X'}


Fri, 25 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published: 2019-05-30T16:27:54

Updated: 2025-03-24T15:43:31.634Z

Reserved: 2018-04-02T00:00:00

Link: CVE-2018-9193

cve-icon Vulnrichment

Updated: 2024-08-05T07:17:51.468Z

cve-icon NVD

Status : Modified

Published: 2019-05-30T17:29:00.340

Modified: 2025-03-24T16:15:15.103

Link: CVE-2018-9193

cve-icon Redhat

No data.