ID

VAR-201905-0106


CVE

CVE-2019-5589


TITLE

FortiClient Online Installer Vulnerabilities related to untrusted search paths

Trust: 0.8

sources: JVNDB: JVNDB-2019-004866

DESCRIPTION

An Unsafe Search Path vulnerability in FortiClient Online Installer (Windows version before 6.0.6) may allow an unauthenticated, remote attacker with control over the directory in which FortiClientOnlineInstaller.exe resides to execute arbitrary code on the system via uploading malicious .dll files in that directory. FortiClient Online Installer Contains an unreliable search path vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Fortinet FortiClient is prone to a arbitrary code-execution vulnerability. A remote attacker can leverage this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial of service condition. Versions prior to FortiClient 6.0.6 are vulnerable. Fortinet FortiClient is a mobile terminal security solution developed by Fortinet. The solution provides IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication when connected to FortiGate firewall appliances. FortiClient Online Installer is an online installer for FortiClient. A code issue vulnerability exists in the FortiClient Online Installer in Fortinet FortiClient versions prior to 6.0.6 (Windows). This vulnerability stems from improper design or implementation problems in the code development process of network systems or products

Trust: 1.98

sources: NVD: CVE-2019-5589 // JVNDB: JVNDB-2019-004866 // BID: 108406 // VULHUB: VHN-157024

AFFECTED PRODUCTS

vendor:fortinetmodel:forticlientscope:ltversion:6.0.6

Trust: 1.0

vendor:fortinetmodel:forticlientscope:ltversion:6.0.6 (windows)

Trust: 0.8

vendor:fortinetmodel:forticlientscope:neversion:6.0.6

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:6.0.2

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:3.0.614

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:6.0.3

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:5.6.1

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:5.4.1

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:5.2.28

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:6.0.4

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:6.0.1

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:5.2.3.091

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:5.2.4.0650

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:2.0

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:5.0.10

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:5.4.3

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:5.4.4

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:5.4

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:6.0.5

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:5.2.3.633

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:5.4.2

Trust: 0.3

vendor:fortinetmodel:forticlientscope:eqversion:5.6

Trust: 0.3

sources: BID: 108406 // JVNDB: JVNDB-2019-004866 // NVD: CVE-2019-5589

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-5589
value: HIGH

Trust: 1.0

NVD: CVE-2019-5589
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201905-729
value: HIGH

Trust: 0.6

VULHUB: VHN-157024
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-5589
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-157024
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-5589
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-157024 // JVNDB: JVNDB-2019-004866 // CNNVD: CNNVD-201905-729 // NVD: CVE-2019-5589

PROBLEMTYPE DATA

problemtype:CWE-426

Trust: 1.9

sources: VULHUB: VHN-157024 // JVNDB: JVNDB-2019-004866 // NVD: CVE-2019-5589

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201905-729

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201905-729

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004866

PATCH

title:FG-IR-19-060url:https://fortiguard.com/psirt/FG-IR-19-060

Trust: 0.8

title:Fortinet FortiClient Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92861

Trust: 0.6

sources: JVNDB: JVNDB-2019-004866 // CNNVD: CNNVD-201905-729

EXTERNAL IDS

db:NVDid:CVE-2019-5589

Trust: 2.8

db:BIDid:108406

Trust: 1.0

db:JVNDBid:JVNDB-2019-004866

Trust: 0.8

db:CNNVDid:CNNVD-201905-729

Trust: 0.7

db:AUSCERTid:ESB-2019.1785

Trust: 0.6

db:AUSCERTid:ESB-2019.1785.2

Trust: 0.6

db:VULHUBid:VHN-157024

Trust: 0.1

sources: VULHUB: VHN-157024 // BID: 108406 // JVNDB: JVNDB-2019-004866 // CNNVD: CNNVD-201905-729 // NVD: CVE-2019-5589

REFERENCES

url:https://fortiguard.com/advisory/fg-ir-19-060

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-5589

Trust: 1.4

url:https://www.securityfocus.com/bid/108406

Trust: 1.2

url:http://www.forticlient.com/

Trust: 0.9

url:https://fortiguard.com/psirt/fg-ir-19-06

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5589

Trust: 0.8

url:https://fortiguard.com/psirt/fg-ir-19-060

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1785.2/

Trust: 0.6

url:https://vigilance.fr/vulnerability/fortinet-forticlient-executing-dll-code-29347

Trust: 0.6

url:https://www.auscert.org.au/bulletins/81226

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1785/

Trust: 0.6

sources: VULHUB: VHN-157024 // BID: 108406 // JVNDB: JVNDB-2019-004866 // CNNVD: CNNVD-201905-729 // NVD: CVE-2019-5589

CREDITS

Honc

Trust: 0.9

sources: BID: 108406 // CNNVD: CNNVD-201905-729

SOURCES

db:VULHUBid:VHN-157024
db:BIDid:108406
db:JVNDBid:JVNDB-2019-004866
db:CNNVDid:CNNVD-201905-729
db:NVDid:CVE-2019-5589

LAST UPDATE DATE

2024-11-23T22:21:42.071000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-157024date:2019-05-29T00:00:00
db:BIDid:108406date:2019-05-16T00:00:00
db:JVNDBid:JVNDB-2019-004866date:2019-06-11T00:00:00
db:CNNVDid:CNNVD-201905-729date:2020-03-13T00:00:00
db:NVDid:CVE-2019-5589date:2024-11-21T04:45:11.217

SOURCES RELEASE DATE

db:VULHUBid:VHN-157024date:2019-05-28T00:00:00
db:BIDid:108406date:2019-05-16T00:00:00
db:JVNDBid:JVNDB-2019-004866date:2019-06-11T00:00:00
db:CNNVDid:CNNVD-201905-729date:2019-05-16T00:00:00
db:NVDid:CVE-2019-5589date:2019-05-28T22:29:00.670