PSIRT Advisories

The FortiGuard Labs Product Security Incident Response Team (PSIRT) continually test Fortinet hardware and software products, looking for vulnerabilities and weaknesses. Any such findings are fed back to Fortinet's development teams and serious issues are described along with protective solutions in the advisories below.

A privilege escalation vulnerability in FortiClient for Linux may allow a user with low privilege to run root system commands,...

Nov 15, 2019 Risk IR Number: FG-IR-19-238
A privilege escalation vulnerability in FortiOS may allow admin users to elevate their profile to super_admin, via restoring modified...

Nov 14, 2019 Risk IR Number: FG-IR-17-053
VM appliance lack of root file system integrity check may allow an attacker with read/write access to the VM image (before it...

Nov 14, 2019 Risk IR Number: FG-IR-19-017
Improper permission or value checking in the CLI console may allow a non-privileged user to obtain plaint text private keys of...

Nov 14, 2019 Risk IR Number: FG-IR-19-134
Multiple integer overflow and out of bounds read/write vulnerabilities in the SSL VPN web-mode SSH client may allow an unauthenticated...

Nov 14, 2019 Risk IR Number: FG-IR-19-099
A clear text storage of sensitive information vulnerability in FortiClient for Mac may allow a local attacker  to read sensitive...

Nov 08, 2019 Risk IR Number: FG-IR-19-227
An OS command injection vulnerability in FortiExtender CLI admin console may allow unauthorized administrators to run arbitrary...

Nov 01, 2019 Risk IR Number: FG-IR-19-273