[FortiClientMac] Privilege escalation using installer/uninstaller binaries (Improper Symlink following)

Summary

A UNIX symbolic link (Symlink) Following (CWE-61) vulnerability in FortiClient for MacOS may allow a local and unprivileged user to overwrite privileged shell scripts executed during the installation phase via escalating their privileges to root.

Affected Products

FortiClient for MacOS versions 6.4.3 and below.

Solutions

Please upgrade to FortiClient for MacOS version 6.4.4 or above.
Please upgrade to FortiClient for MacOS version 7.0.0 or above.

Acknowledgement

Fortinet is pleased to thank Csaba Fitzl and Trend Micro Zero Day Initiative for bringing this issue to our attention under responsible disclosure.

Timeline

2021-07-07: Initial publication