CVE-2024-50570
MEDIUMDescription
A Cleartext Storage of Sensitive Information vulnerability [CWE-312] in FortiClientWindows 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13 and FortiClientLinux 7.4.0 through 7.4.2, 7.2.0 through 7.2.7, 7.0.0 through 7.0.13 may permit a local authenticated user to retrieve VPN password via memory dump, due to JavaScript's garbage collector
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| fortinet | forticlient |
| fortinet | forticlient |
| fortinet | forticlient |
| fortinet | forticlient |
| fortinet | forticlient |
References
Advisories & Patches
Frequently Asked Questions
What is CVE-2024-50570? +
How severe is CVE-2024-50570? +
What products are affected by CVE-2024-50570? +
How do I check if I'm vulnerable to CVE-2024-50570? +
Related Vulnerabilities
The lack of encryption in the DuoxMe (formerly Blue) application binary in versions prior to 3.3.1 for iOS devices allows …
next-forge is a Next.js project boilerplate for modern web application. The BASEHUB_TOKEN commited in apps/web/.env.example. Users should avoid use of …
PMD is an extensible multilanguage static code analyzer. The passphrase for the PMD and PMD Designer release signing keys are …
This vulnerability exists in the Tinxy smart devices due to storage of credentials in plaintext within the device firmware. An …
Valmet DNA user passwords in plain text. This practice poses a security risk as attackers who gain access to local …
This vulnerability exists in TP-Link Tapo H200 V1 IoT Smart Hub due to storage of Wi-Fi credentials in plain text …