Show plain JSON{"id": "CVE-2017-7344", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.6, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "HIGH", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 4.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.2}]}, "published": "2017-12-14T18:29:00.210", "references": [{"url": "http://www.securityfocus.com/bid/102176", "tags": ["Third Party Advisory", "VDB Entry"], "source": "psirt@fortinet.com"}, {"url": "https://fortiguard.com/advisory/FG-IR-17-070", "tags": ["Vendor Advisory"], "source": "psirt@fortinet.com"}, {"url": "https://securite.intrinsec.com/2017/12/22/cve-2017-7344-fortinet-forticlient-windows-privilege-escalation-at-logon/", "tags": ["Exploit", "Mitigation", "Third Party Advisory"], "source": "psirt@fortinet.com"}, {"url": "http://www.securityfocus.com/bid/102176", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://fortiguard.com/advisory/FG-IR-17-070", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://securite.intrinsec.com/2017/12/22/cve-2017-7344-fortinet-forticlient-windows-privilege-escalation-at-logon/", "tags": ["Exploit", "Mitigation", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "A privilege escalation in Fortinet FortiClient Windows 5.4.3 and earlier as well as 5.6.0 allows attacker to gain privilege via exploiting the Windows \"security alert\" dialog thereby popping up when the \"VPN before logon\" feature is enabled and an untrusted certificate chain."}, {"lang": "es", "value": "Una escalada de privilegios en Fortinet FortiClient Windows en versiones 5.4.3 y anteriores, as\u00ed como la versi\u00f3n 5.6.0, permite que un atacante consiga privilegios explotando el di\u00e1logo de Windows \"security alert\" que aparece cuando la caracter\u00edstica \"VPN before logon\" est\u00e1 habilitada y se conecta un certificado no fiable."}], "lastModified": "2025-04-20T01:37:25.860", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "3FA54405-BA2E-4B8D-A333-1CD47CCE784A", "versionEndIncluding": "5.4.3"}, {"criteria": "cpe:2.3:a:fortinet:forticlient:5.6.0:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "4A0005D2-3558-414D-97AC-ACAD11C0FD10"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@fortinet.com"}