CVE-2024-50570

MEDIUM EXPLOITED

Fortinet Forticlient < 7.0.14 - Cleartext Storage

Title source: rule
STIX 2.1

Description

A Cleartext Storage of Sensitive Information vulnerability [CWE-312] in FortiClientWindows 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13 and FortiClientLinux 7.4.0 through 7.4.2, 7.2.0 through 7.2.7, 7.0.0 through 7.0.13 may permit a local authenticated user to retrieve VPN password via memory dump, due to JavaScript's garbage collector

Scores

CVSS v3 5.0
EPSS 0.0002
EPSS Percentile 4.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

VulnCheck KEV 2024-11-15
CWE
CWE-312
Status published
Products (2)
fortinet/forticlient 7.0.0 - 7.0.14
fortinet/forticlient 7.0.0 - 7.2.8
Published Dec 18, 2024
Tracked Since Feb 18, 2026