An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Link | Tags |
---|---|
https://fortiguard.com/psirt/FG-IR-20-040 | broken link |
https://www.fortiguard.com/psirt/FG-IR-20-040 | vendor advisory |