CVE-2022-33878
CVSS Score
2.2
EPSS Score
0.0%
EPSS Percentile
0th
An exposure of sensitive information to an unauthorized actor vulnerabiltiy [CWE-200] in FortiClient for Mac versions 7.0.0 through 7.0.5 may allow a local authenticated attacker to obtain the SSL-VPN password in cleartext via running a logstream for the FortiTray process in the terminal.
| Vendor | fortinet |
| Product | fortinet forticlientmac |
| Ecosystems | |
| Industries | NetworkingSecurity |
| Published | Nov 2, 2022 |
| Last Updated | Oct 22, 2024 |
Stay Ahead of the Next One
Get instant alerts for fortinet fortinet forticlientmac
Be the first to know when new low vulnerabilities affecting fortinet fortinet forticlientmac are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Affected Versions
Fortinet / Fortinet FortiClientMac
FortiClientMac 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, 7.0.0