CVE-2024-54019
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-06-10
Last updated on: 2025-07-25
Assigner: Fortinet, Inc.
Description
Description
A improper validation of certificate with host mismatch in Fortinet FortiClientWindows version 7.4.0, versions 7.2.0 through 7.2.6, and 7.0 all versions allow an unauthorized attacker to redirect VPN connections via DNS spoofing or another form of redirection.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fortinet | forticlient | From 7.4.0 (inc) to 7.4.3 (inc) |
| fortinet | forticlient | 7.4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-297 | The product communicates with a host that provides a certificate, but the product does not properly ensure that the certificate is actually associated with that host. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper validation of certificates with host mismatch in Fortinet FortiClient Windows versions 7.4.0, 7.2.0 through 7.2.6, and all 7.0 versions. It allows an unauthorized attacker to redirect VPN connections by exploiting DNS spoofing or other redirection methods.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to redirect your VPN connections without authorization, potentially exposing your network traffic to interception or manipulation, which could lead to loss of confidentiality and integrity of your data.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70