FortiClient: Cleartext Storage of Sensitive Information in VPN Password Handling
CVE-2024-50570 Published on December 18, 2024
A Cleartext Storage of Sensitive Information vulnerability [CWE-312] in FortiClientWindows 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13 and FortiClientLinux 7.4.0 through 7.4.2, 7.2.0 through 7.2.7, 7.0.0 through 7.0.13 may permit a local authenticated user to retrieve VPN password via memory dump, due to JavaScript's garbage collector
Vulnerability Analysis
CVE-2024-50570 is exploitable with local system access, requires user interaction and user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
Cleartext Storage of Sensitive Information
The application stores sensitive information in cleartext within a resource that might be accessible to another control sphere. Because the information is stored in cleartext, attackers could potentially read it. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
Products Associated with CVE-2024-50570
Want to know whenever a new CVE is published for Fortinet FortiClient? stack.watch will email you.
Affected Versions
Fortinet FortiClientMac:- Version 7.4.0, <= 7.4.2 is affected.
- Version 7.2.0, <= 7.2.7 is affected.
- Version 7.0.0, <= 7.0.14 is affected.
- Version 7.4.0, <= 7.4.2 is affected.
- Version 7.2.0, <= 7.2.7 is affected.
- Version 7.0.0, <= 7.0.13 is affected.
- Version 7.4.0 is affected.
- Version 7.2.0, <= 7.2.5 is affected.
- Version 7.0.0, <= 7.0.13 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.