Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-36513

CVSS 7.4 · High EPSS 0.17% · P37
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-36513

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A privilege context switching error vulnerability [CWE-270] in FortiClient Windows version 7.2.4 and below, version 7.0.12 and below, 6.4 all versions may allow an authenticated user to escalate their privileges via lua auto patch scripts.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
特权上下文切换错误
Source: NVD (National Vulnerability Database)
Vulnerability Title
Fortinet FortiClient 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Fortinet FortiClient是美国飞塔(Fortinet)公司的一套移动终端安全解决方案。该方案与FortiGate防火墙设备连接时可提供IPsec和SSL加密、广域网优化、终端合规和双因子认证等功能。 Fortinet FortiClient Windows存在安全漏洞,该漏洞源于包含一个特权上下文切换错误问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
FortinetFortiClientWindows 7.2.0 ~ 7.2.4 -

II. Public POCs for CVE-2024-36513

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-36513

登录查看更多情报信息。

Same Patch Batch · Fortinet · 2024-11-12 · 16 CVEs total

CVE-2023-501767.1 HIGHFortinet FortiOS 授权问题漏洞
CVE-2024-236667.1 HIGHFortinet FortiManager和FortiAnalyzer 安全漏洞
CVE-2024-405926.8 MEDIUMFortinet FortiClient 数据伪造问题漏洞
CVE-2024-365076.7 MEDIUMFortinet FortiClientWindows 安全漏洞
CVE-2024-314966.3 MEDIUMFortinet FortiManager和FortiAnalyzer 安全漏洞
CVE-2024-321186.3 MEDIUMFortinet FortiManager和FortiAnalyzer 操作系统命令注入漏洞
CVE-2024-335055.3 MEDIUMFortinet FortiManager和FortiAnalyzer 安全漏洞
CVE-2024-260115.2 MEDIUMFortinet多款产品 安全漏洞
CVE-2023-475435.1 MEDIUMFortinet FortiPortal 安全漏洞
CVE-2024-321164.8 MEDIUMFortinet FortiManager和FortiAnalyzer 安全漏洞
CVE-2024-321174.7 MEDIUMFortinet FortiManager和FortiAnalyzer 路径遍历漏洞
CVE-2023-442553.9 LOWFortinet FortiManager 安全漏洞
CVE-2024-365093.8 LOWFortinet FortiWeb 安全漏洞
CVE-2024-335103.6 LOWFortinet FortiOS和FortiProxy 安全特征问题漏洞
CVE-2024-352742.2 LOWFortinet FortiManager和FortiAnalyzer 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2024-36513

No comments yet


Leave a comment