Learn about CVE-2020-9291, an Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and earlier versions that could allow local privilege escalation. Find mitigation steps and preventive measures here.
FortiClient for Windows 6.2.1 and earlier versions are affected by an Insecure Temporary File vulnerability that could lead to privilege escalation.
Understanding CVE-2020-9291
What is CVE-2020-9291?
An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
The Impact of CVE-2020-9291
This vulnerability has a CVSS base score of 6.3, indicating a medium severity level. It could potentially allow a local user to escalate privileges.
Technical Details of CVE-2020-9291
Vulnerability Description
The vulnerability in FortiClient for Windows 6.2.1 and earlier versions arises from improper handling of temporary files, enabling a local user to exploit it for privilege escalation.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by a local user through exhausting the pool of temporary file names combined with a symbolic link attack.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Apply security patches and updates provided by Fortinet to address the vulnerability.