The bug tracked as CVE-2024-47574 allows a low-privilege user or malware to gain higher privileges on FortiClient VPN, potentially leading to system takeover.
Pentera Labs' Nir Chako reported a high-severity bug in FortiClient VPN that allows unauthorized code execution by exploiting Windows named pipes, leading to privilege escalation.
Chako explained that the exploit involves using named pipes with FortiClient, enabling scripts to run with higher user privileges, thus achieving unauthorized code execution.
According to Chako, the vulnerability CVE-2024-50564, also found in FortiClient, allows altering SYSTEM-level registry keys, but it has been fixed in version 7.4.1.
Collection
[
|
...
]