Lucene search

K
vulnrichmentFortinetVULNRICHMENT:CVE-2024-31489
HistorySep 10, 2024 - 2:37 p.m.

CVE-2024-31489

2024-09-1014:37:48
CWE-295
fortinet
github.com
19
improper certificate validation
forticlient
mitm attack
ztna tunnel creation
cve-2024-31489

CVSS3

6.8

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:U/RC:C

AI Score

7.3

Confidence

Low

EPSS

0.001

Percentile

39.6%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:fortinet:forticlientmac:*:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "forticlientmac",
    "versions": [
      {
        "status": "affected",
        "version": "7.2.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.2.4"
      },
      {
        "status": "affected",
        "version": "7.0.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.0.11"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:fortinet:forticlientlinux:*:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "forticlientlinux",
    "versions": [
      {
        "status": "affected",
        "version": "7.2.0"
      },
      {
        "status": "affected",
        "version": "7.0.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.0.11"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:fortinet:forticlientwindows:*:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "forticlientwindows",
    "versions": [
      {
        "status": "affected",
        "version": "7.2.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.2.2"
      },
      {
        "status": "affected",
        "version": "7.0.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.0.11"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.8

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:U/RC:C

AI Score

7.3

Confidence

Low

EPSS

0.001

Percentile

39.6%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-31489