Lucene search

K
cveFortinetCVE-2024-21753
HistorySep 10, 2024 - 3:15 p.m.

CVE-2024-21753

2024-09-1015:15:14
CWE-22
fortinet
web.nvd.nist.gov
30
vulnerability
path traversal
fortinet forticlientems
denial of service
http request
file read
file write

CVSS3

6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H

AI Score

7

Confidence

High

EPSS

0.001

Percentile

17.0%

A improper limitation of a pathname to a restricted directory (‘path traversal’) in Fortinet FortiClientEMS versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.13, 6.4.0 through 6.4.9, 6.2.0 through 6.2.9, 6.0.0 through 6.0.8, 1.2.1 through 1.2.5 allows attacker to perform a denial of service, read or write a limited number of files via specially crafted HTTP requests

Affected configurations

Nvd
Node
fortinetforticlient_endpoint_management_serverRange1.2.11.2.5
OR
fortinetforticlient_endpoint_management_serverRange6.0.06.0.8
OR
fortinetforticlient_endpoint_management_serverRange6.2.06.2.9
OR
fortinetforticlient_endpoint_management_serverRange6.4.06.4.9
OR
fortinetforticlient_endpoint_management_serverRange7.0.07.0.13
OR
fortinetforticlient_endpoint_management_serverRange7.2.07.2.4
VendorProductVersionCPE
fortinetforticlient_endpoint_management_server*cpe:2.3:a:fortinet:forticlient_endpoint_management_server:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiClientEMS",
    "cpes": [],
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.13",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.7",
        "lessThanOrEqual": "6.4.9",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.4",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.6",
        "lessThanOrEqual": "6.2.9",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.4",
        "status": "affected"
      },
      {
        "version": "6.0.8",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.0.0",
        "lessThanOrEqual": "6.0.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "1.2.2",
        "lessThanOrEqual": "1.2.5",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H

AI Score

7

Confidence

High

EPSS

0.001

Percentile

17.0%

Related for CVE-2024-21753