FortiClient VPN iOS Cleartext Password Storage Vulnerability (CVE-2024-35282)
CVE-2024-35282 Published on September 10, 2024
A cleartext storage of sensitive information in memory vulnerability [CWE-316] affecting FortiClient VPN iOS 7.2 all versions, 7.0 all versions, 6.4 all versions, 6.2 all versions, 6.0 all versions may allow an unauthenticated attacker that has physical access to a jailbroken device to obtain cleartext passwords via keychain dump.
Vulnerability Analysis
CVE-2024-35282 is exploitable with physical access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
Cleartext Storage of Sensitive Information in Memory
The application stores sensitive information in cleartext in memory.
Products Associated with CVE-2024-35282
stack.watch emails you whenever new vulnerabilities are published in Fortinet FortiClient or Fortinet Forticlientios. Just hit a watch button to start following.
Affected Versions
Fortinet FortiClientiOS:- Version 7.2.0, <= 7.2.5 is affected.
- Version 7.0.3, <= 7.0.9 is affected.
- Version 7.0.0, <= 7.0.1 is affected.
- Version 6.4.2, <= 6.4.6 is affected.
- Version 6.4.0 is affected.
- Version 6.2.1, <= 6.2.4 is affected.
- Version 6.0.0, <= 6.0.5 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.