CVE-2024-35281

2.5 LOW

📋 TL;DR

This vulnerability allows authenticated attackers to inject code via Electron environment variables in Fortinet desktop applications. It affects FortiClientMac versions 7.4.2 and below, 7.2.8 and below, all 7.0 versions, and FortiVoiceUCDesktop 3.0 all versions. Attackers must already have authenticated access to the system.

💻 Affected Systems

Products:
  • FortiClientMac
  • FortiVoiceUCDesktop
Versions: FortiClientMac: 7.4.2 and below, 7.2.8 and below, all 7.0 versions; FortiVoiceUCDesktop: all 3.0 versions
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the system. Electron-based desktop applications on macOS.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains code execution with user privileges, potentially leading to privilege escalation, data theft, or lateral movement.

🟠

Likely Case

Authenticated user with malicious intent executes arbitrary code within their privilege level, compromising local system integrity.

🟢

If Mitigated

With proper access controls and least privilege, impact limited to authenticated user's own environment with minimal system-wide effects.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of Electron environment variable manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiClientMac 7.4.3 or later, 7.2.9 or later; FortiVoiceUCDesktop 3.0.1 or later

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-025

Restart Required: Yes

Instructions:

1. Download latest version from Fortinet support portal. 2. Install update following vendor instructions. 3. Restart system to complete installation.

🔧 Temporary Workarounds

Restrict user privileges

all

Implement least privilege principle to limit authenticated users' ability to modify environment variables.

🧯 If You Can't Patch

  • Remove affected applications from critical systems
  • Implement strict access controls and monitoring for authenticated users

🔍 How to Verify

Check if Vulnerable:

Check application version in About dialog or via command line: /Applications/FortiClient.app/Contents/MacOS/FortiClient --version

Check Version:

/Applications/FortiClient.app/Contents/MacOS/FortiClient --version

Verify Fix Applied:

Verify installed version is 7.4.3+ or 7.2.9+ for FortiClientMac, or 3.0.1+ for FortiVoiceUCDesktop

📡 Detection & Monitoring

Log Indicators:

  • Unusual process spawning from Fortinet applications
  • Modification of Electron environment variables

Network Indicators:

  • None - local exploitation only

SIEM Query:

process_name:"FortiClient" AND parent_process:electron

🔗 References

📤 Share & Export