CVE-2024-36506
LOWDescription
An improper verification of source of a communication channel vulnerability [CWE-940] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, 6.4 all versions may allow a remote attacker to bypass the trusted host feature via session connection.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| fortinet | forticlientems |
| fortinet | forticlientems |
| fortinet | forticlientems_cloud |
| fortinet | forticlientems_cloud |
References
Advisories & Patches
Frequently Asked Questions
What is CVE-2024-36506? +
How severe is CVE-2024-36506? +
What products are affected by CVE-2024-36506? +
How do I check if I'm vulnerable to CVE-2024-36506? +
Related Vulnerabilities
Some payload elements of the messages sent between two stations in a networking architecture are not properly checked on the …
An issue in SHENZHEN TENDA TECHNOLOGY CO.,LTD Tenda AX2pro V16.03.29.48_cn allows a remote attacker to execute arbitrary code via the …
An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a remote attacker to …
Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing an …
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation …
An issue in H3C Technologies Co., Limited H3C Magic RC3000 RC3000V100R009 allows a remote attacker to execute arbitrary code via …