CVE-2024-50570
Dec. 18, 2024, 3:15 p.m.
Tags
CVSS Score
Product(s) Impacted
FortiClientWindows
- 7.4.0 - 7.4.1
- 7.2.0 - 7.2.6
- 7.0.0 - 7.0.13
FortiClientLinux
- 7.4.0 - 7.4.2
- 7.2.0 - 7.2.7
- 7.0.0 - 7.0.13
Description
A Cleartext Storage of Sensitive Information vulnerability [CWE-312] in FortiClientWindows 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13 and FortiClientLinux 7.4.0 through 7.4.2, 7.2.0 through 7.2.7, 7.0.0 through 7.0.13 may permit a local authenticated user to retrieve VPN password via memory dump, due to JavaScript's garbage collector
Weaknesses
CWE-312
Cleartext Storage of Sensitive Information
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
CWE ID: 312Date
Published: Dec. 18, 2024, 1:15 p.m.
Last Modified: Dec. 18, 2024, 3:15 p.m.
Status : Received
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
psirt@fortinet.com
CVSS Data
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
Base Score
Exploitability Score
Impact Score
Base Severity
MEDIUMCVSS Vector String
The CVSS vector string provides an in-depth view of the vulnerability metrics.
View Vector StringCVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N