Arbitrary code execution vulnerability in Fortinet FortiClient - CVE-2015-5736ID: oval:org.secpod.oval:def:63947 | Date: (C)2020-06-26 (M)2024-01-23 |
Class: VULNERABILITY | Family: windows |
The host is installed with Fortinet FortiClient before 5.2.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle an issue in the Fortishield.sys driver. Successful exploitation allows local attackers to execute arbitrary code with kernel privileges.
Platform: |
Microsoft Windows Server 2008 |
Microsoft Windows 7 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows 10 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Product: |
Fortinet FortiClient |