CVE-2024-50564
FortiClient vulnerability analysis and mitigation

Overview

A use of hard-coded cryptographic key vulnerability (CVE-2024-50564) was discovered in Fortinet FortiClient Windows. The vulnerability affects FortiClient Windows versions 7.4.0, 7.2.x (all versions), 7.0.x (all versions), and 6.4.x (all versions). The issue was initially disclosed on January 14, 2025, and received a CVSS v3.1 base score of 3.3 (Low) (NVD, Fortinet PSIRT).

Technical details

The vulnerability (CWE-321) involves the use of a hard-coded cryptographic key in the FortiClient Windows application that is used for interprocess communication via named pipes. The vulnerability has been assigned a CVSS vector of CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, indicating local access requirements, low attack complexity, and low privileges needed (NVD).

Impact

The vulnerability may allow a low-privileged user to decrypt interprocess communication by monitoring named pipes, potentially leading to information disclosure. The impact is considered low, affecting only the confidentiality aspect of the system, with no direct impact on integrity or availability (Fortinet PSIRT).

Mitigation and workarounds

Fortinet has released version 7.4.1 to address this vulnerability. Users running affected versions are advised to upgrade to FortiClient 7.4.1 or above. For users running older versions (7.2.x, 7.0.x, and 6.4.x), Fortinet recommends migrating to a fixed release (Fortinet PSIRT).

Community reactions

The vulnerability was initially reported by Pentera Labs' security researcher Nir Chako, who confirmed that version 7.4.1 successfully prevents the exploitation techniques. The vulnerability disclosure was scheduled for a formal advisory update on December 10's Patch Tuesday (Register).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management