FortiClientMac v7.0.0-7.0.7 Vulnerable to Local PrivEsc via No Integrity Check
CVE-2023-22635 Published on April 11, 2023
A download of code without Integrity check vulnerability [CWE-494] in FortiClientMac version 7.0.0 through 7.0.7, 6.4 all versions, 6.2 all versions, 6.0 all versions, 5.6 all versions, 5.4 all versions, 5.2 all versions, 5.0 all versions and 4.0 all versions may allow a local attacker to escalate their privileges via modifying the installer upon upgrade.
Vulnerability Analysis
CVE-2023-22635 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and a small impact on availability.
Weakness Type
Download of Code Without Integrity Check
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code. An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit.
Products Associated with CVE-2023-22635
Want to know whenever a new CVE is published for Fortinet FortiClient? stack.watch will email you.
Affected Versions
Fortinet FortiClientMac:- Version 7.0.0, <= 7.0.7 is affected.
- Version 6.4.0, <= 6.4.10 is affected.
- Version 6.2.0, <= 6.2.9 is affected.
- Version 6.0.1, <= 6.0.10 is affected.
- Version 5.6.5, <= 5.6.6 is affected.
- Version 5.6.3 is affected.
- Version 5.6.0, <= 5.6.1 is affected.
- Version 5.4.0, <= 5.4.4 is affected.
- Version 5.2.0, <= 5.2.6 is affected.
- Version 5.0.0, <= 5.0.10 is affected.
- Version 4.0.0, <= 4.0.3 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.