ID

VAR-202211-0070


CVE

CVE-2022-33878


TITLE

fortinet's  macOS  for  FortiClient  Vulnerability regarding information leakage in

Trust: 0.8

sources: JVNDB: JVNDB-2022-022812

DESCRIPTION

An exposure of sensitive information to an unauthorized actor vulnerabiltiy [CWE-200] in FortiClient for Mac versions 7.0.0 through 7.0.5 may allow a local authenticated attacker to obtain the SSL-VPN password in cleartext via running a logstream for the FortiTray process in the terminal. fortinet's macOS for FortiClient There is a vulnerability related to information leakage.Information may be obtained

Trust: 1.71

sources: NVD: CVE-2022-33878 // JVNDB: JVNDB-2022-022812 // VULHUB: VHN-426029

AFFECTED PRODUCTS

vendor:fortinetmodel:forticlientscope:gteversion:7.0.0

Trust: 1.0

vendor:fortinetmodel:forticlientscope:lteversion:7.0.5

Trust: 1.0

vendor:フォーティネットmodel:forticlientscope:eqversion:7.0.0 to 7.0.5

Trust: 0.8

vendor:フォーティネットmodel:forticlientscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-022812 // NVD: CVE-2022-33878

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-33878
value: MEDIUM

Trust: 1.0

psirt@fortinet.com: CVE-2022-33878
value: LOW

Trust: 1.0

NVD: CVE-2022-33878
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202211-1883
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-33878
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

psirt@fortinet.com: CVE-2022-33878
baseSeverity: LOW
baseScore: 2.2
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 0.8
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2022-33878
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-022812 // CNNVD: CNNVD-202211-1883 // NVD: CVE-2022-33878 // NVD: CVE-2022-33878

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.0

problemtype:information leak (CWE-200) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-532

Trust: 0.1

sources: VULHUB: VHN-426029 // JVNDB: JVNDB-2022-022812 // NVD: CVE-2022-33878

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202211-1883

TYPE

log information leak

Trust: 0.6

sources: CNNVD: CNNVD-202211-1883

PATCH

title:FG-IR-22-246url:https://fortiguard.com/psirt/FG-IR-22-246

Trust: 0.8

sources: JVNDB: JVNDB-2022-022812

EXTERNAL IDS

db:NVDid:CVE-2022-33878

Trust: 3.3

db:JVNDBid:JVNDB-2022-022812

Trust: 0.8

db:CNNVDid:CNNVD-202211-1883

Trust: 0.6

db:VULHUBid:VHN-426029

Trust: 0.1

sources: VULHUB: VHN-426029 // JVNDB: JVNDB-2022-022812 // CNNVD: CNNVD-202211-1883 // NVD: CVE-2022-33878

REFERENCES

url:https://fortiguard.com/psirt/fg-ir-22-246

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-33878

Trust: 0.8

url:https://vigilance.fr/vulnerability/forticlient-mac-information-disclosure-via-fortitray-cleartext-sslvpn-password-39797

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-33878/

Trust: 0.6

sources: VULHUB: VHN-426029 // JVNDB: JVNDB-2022-022812 // CNNVD: CNNVD-202211-1883 // NVD: CVE-2022-33878

SOURCES

db:VULHUBid:VHN-426029
db:JVNDBid:JVNDB-2022-022812
db:CNNVDid:CNNVD-202211-1883
db:NVDid:CVE-2022-33878

LAST UPDATE DATE

2024-08-14T15:00:43.535000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-426029date:2022-11-04T00:00:00
db:JVNDBid:JVNDB-2022-022812date:2023-11-21T01:20:00
db:CNNVDid:CNNVD-202211-1883date:2022-11-07T00:00:00
db:NVDid:CVE-2022-33878date:2023-08-08T14:22:24.967

SOURCES RELEASE DATE

db:VULHUBid:VHN-426029date:2022-11-02T00:00:00
db:JVNDBid:JVNDB-2022-022812date:2023-11-21T00:00:00
db:CNNVDid:CNNVD-202211-1883date:2022-11-01T00:00:00
db:NVDid:CVE-2022-33878date:2022-11-02T12:15:53.193