CVE-2024-36513
HIGHDescription
A privilege context switching error vulnerability [CWE-270] in FortiClient Windows version 7.2.4 and below, version 7.0.12 and below, 6.4 all versions may allow an authenticated user to escalate their privileges via lua auto patch scripts.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| fortinet | forticlient |
| fortinet | forticlient |
| fortinet | forticlient |
References
Advisories & Patches
Frequently Asked Questions
What is CVE-2024-36513? +
How severe is CVE-2024-36513? +
What products are affected by CVE-2024-36513? +
How do I check if I'm vulnerable to CVE-2024-36513? +
Related Vulnerabilities
When the Global Pointer (GP) relative addressing is enabled (CONFIG_RISCV_GP=y), the gp reg points at 0x800 bytes past the start …
XWiki is a generic wiki platform. Any user with edit right on a page (could be the user's profile) can …
System call entry on Cortex M (and possibly R and A, but I think not) has a race which allows …
Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data …
Privilege context switching error in Windows Administrator Protection allows an authorized attacker to elevate privileges locally.
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.4.6, from 17.5 prior …