- Description
- A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.
- Source
- psirt@fortinet.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 3.3
- Impact score
- 1.4
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- Severity
- LOW
- Hype score
- Not currently trending
CVE-2024-50564 A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-pri… https://t.co/aUUyQGARv2
@CVEnew
14 Jan 2025
89 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Fortinet fixes FortiClient VPN Flaw CVE-2024-47574 #Fortinet #FortiClient #CVE-2024-47574 #CVE-2024-50564 https://t.co/Y2V1WER5LW
@pravin_karthik
15 Nov 2024
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"vulnerable": true,
"matchCriteriaId": "6089DAFE-EBC1-4082-BBFE-72D88B53A430",
"versionEndExcluding": "7.4.1",
"versionStartIncluding": "6.4.0"
}
],
"operator": "OR"
}
]
}
]