Vulnerability Details CVE-2018-13368
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attacker to execute unauthorized code or commands via the command injection.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 30.0%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 4.6
Products affected by CVE-2018-13368
-
cpe:2.3:a:fortinet:forticlient:4.0.1
-
cpe:2.3:a:fortinet:forticlient:4.0.2
-
cpe:2.3:a:fortinet:forticlient:4.0.3
-
cpe:2.3:a:fortinet:forticlient:4.0.4
-
cpe:2.3:a:fortinet:forticlient:4.1.0
-
cpe:2.3:a:fortinet:forticlient:4.1.1
-
cpe:2.3:a:fortinet:forticlient:4.1.2
-
cpe:2.3:a:fortinet:forticlient:4.1.3
-
cpe:2.3:a:fortinet:forticlient:4.2.0
-
cpe:2.3:a:fortinet:forticlient:4.2.1
-
cpe:2.3:a:fortinet:forticlient:4.2.2
-
cpe:2.3:a:fortinet:forticlient:4.2.3
-
cpe:2.3:a:fortinet:forticlient:4.2.4
-
cpe:2.3:a:fortinet:forticlient:4.2.5
-
cpe:2.3:a:fortinet:forticlient:4.2.6
-
cpe:2.3:a:fortinet:forticlient:4.2.7
-
cpe:2.3:a:fortinet:forticlient:4.3.0
-
cpe:2.3:a:fortinet:forticlient:4.3.1
-
cpe:2.3:a:fortinet:forticlient:4.3.2
-
cpe:2.3:a:fortinet:forticlient:4.3.3
-
cpe:2.3:a:fortinet:forticlient:4.3.4
-
cpe:2.3:a:fortinet:forticlient:4.3.5
-
cpe:2.3:a:fortinet:forticlient:5.0.10
-
cpe:2.3:a:fortinet:forticlient:5.0.11
-
cpe:2.3:a:fortinet:forticlient:5.0.5
-
cpe:2.3:a:fortinet:forticlient:5.0.6
-
cpe:2.3:a:fortinet:forticlient:5.0.7
-
cpe:2.3:a:fortinet:forticlient:5.0.8
-
cpe:2.3:a:fortinet:forticlient:5.0.9
-
cpe:2.3:a:fortinet:forticlient:5.2.0
-
cpe:2.3:a:fortinet:forticlient:5.2.1
-
cpe:2.3:a:fortinet:forticlient:5.2.2
-
cpe:2.3:a:fortinet:forticlient:5.2.3
-
cpe:2.3:a:fortinet:forticlient:5.2.4
-
cpe:2.3:a:fortinet:forticlient:5.2.5
-
cpe:2.3:a:fortinet:forticlient:5.2.6
-
cpe:2.3:a:fortinet:forticlient:5.4.0
-
cpe:2.3:a:fortinet:forticlient:5.4.1
-
cpe:2.3:a:fortinet:forticlient:5.4.2
-
cpe:2.3:a:fortinet:forticlient:5.4.3
-
cpe:2.3:a:fortinet:forticlient:5.4.4
-
cpe:2.3:a:fortinet:forticlient:5.4.5
-
cpe:2.3:a:fortinet:forticlient:5.6.0
-
cpe:2.3:a:fortinet:forticlient:5.6.1
-
cpe:2.3:a:fortinet:forticlient:5.6.2
-
cpe:2.3:a:fortinet:forticlient:5.6.3
-
cpe:2.3:a:fortinet:forticlient:5.6.4
-
cpe:2.3:a:fortinet:forticlient:5.6.5
-
cpe:2.3:a:fortinet:forticlient:5.6.6
-
cpe:2.3:a:fortinet:forticlient:6.0.0
-
cpe:2.3:a:fortinet:forticlient:6.0.1
-
cpe:2.3:a:fortinet:forticlient:6.0.2
-
cpe:2.3:a:fortinet:forticlient:6.0.3
-
cpe:2.3:a:fortinet:forticlient:6.0.4