CVSS3
Attack Vector
PHYSICAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RC:R
EPSS
Percentile
21.4%
A cleartext storage of sensitive information in memory vulnerability [CWE-316] affecting FortiClient VPN iOS 7.2 all versions, 7.0 all versions, 6.4 all versions, 6.2 all versions, 6.0 all versions may allow an unauthenticated attacker that has physical access to a jailbroken device to obtain cleartext passwords via keychain dump.
[
{
"vendor": "Fortinet",
"product": "FortiClientiOS",
"cpes": [
"cpe:2.3:a:fortinet:forticlientios:7.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticlientios:6.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"versions": [
{
"versionType": "semver",
"version": "7.2.0",
"lessThanOrEqual": "7.2.5",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.0.3",
"lessThanOrEqual": "7.0.9",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.0.0",
"lessThanOrEqual": "7.0.1",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.4.2",
"lessThanOrEqual": "6.4.6",
"status": "affected"
},
{
"version": "6.4.0",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.2.1",
"lessThanOrEqual": "6.2.4",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.0.0",
"lessThanOrEqual": "6.0.5",
"status": "affected"
}
]
}
]