Lucene search

K
cveFortinetCVE-2024-35282
HistorySep 10, 2024 - 3:15 p.m.

CVE-2024-35282

2024-09-1015:15:16
CWE-312
CWE-316
fortinet
web.nvd.nist.gov
29
vulnerability
forticlient vpn
ios versions
cleartext passwords
keychain dump

CVSS3

4.6

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6

Confidence

Low

EPSS

0.001

Percentile

21.4%

A cleartext storage of sensitive information in memory vulnerability [CWE-316] affecting FortiClient VPN iOS 7.2 all versions, 7.0 all versions, 6.4 all versions, 6.2 all versions, 6.0 all versions may allow an unauthenticated attacker that has physical access to a jailbroken device to obtain cleartext passwords via keychain dump.

Affected configurations

Nvd
Node
fortinetforticlientRange6.0.07.2.5iphone_os
VendorProductVersionCPE
fortinetforticlient*cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:iphone_os:*:*

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiClientiOS",
    "cpes": [
      "cpe:2.3:a:fortinet:forticlientios:7.2.5:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.2.4:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.2.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.2.2:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.2.1:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.2.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.0.9:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.0.8:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.0.7:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.0.6:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.0.5:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.0.4:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.0.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.0.1:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:7.0.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.4.6:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.4.5:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.4.4:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.4.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.4.2:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.4.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.2.4:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.2.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.2.2:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.2.1:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.0.5:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.0.4:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.0.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.0.2:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.0.1:*:*:*:*:*:*:*",
      "cpe:2.3:a:fortinet:forticlientios:6.0.0:*:*:*:*:*:*:*"
    ],
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.5",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.3",
        "lessThanOrEqual": "7.0.9",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.2",
        "lessThanOrEqual": "6.4.6",
        "status": "affected"
      },
      {
        "version": "6.4.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.1",
        "lessThanOrEqual": "6.2.4",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.0.0",
        "lessThanOrEqual": "6.0.5",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.6

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6

Confidence

Low

EPSS

0.001

Percentile

21.4%

Related for CVE-2024-35282