A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
References
Link Resource
https://danishcyberdefence.dk/blog/forticlient_linux Exploit Third Party Advisory
https://fortiguard.com/psirt/FG-IR-19-238 Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: fortinet

Published: 2020-02-06T15:10:07

Updated: 2020-02-07T16:04:42

Reserved: 2019-08-27T00:00:00


Link: CVE-2019-15711

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-02-06T16:15:12.213

Modified: 2020-08-24T17:37:01.140


Link: CVE-2019-15711

JSON object: View

cve-icon Redhat Information

No data.