{"containers":{"cna":{"affected":[{"product":"Fortinet FortiClientLinux","vendor":"Fortinet","versions":[{"status":"affected","version":"FortiClientLinux 6.2.1 and below"}]}],"descriptions":[{"lang":"en","value":"A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted \"ExportLogs\" type IPC client requests to the fctsched process."}],"problemTypes":[{"descriptions":[{"description":"Escalation of privilege","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-02-07T16:04:42.000Z","orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://fortiguard.com/psirt/FG-IR-19-238"},{"tags":["x_refsource_MISC"],"url":"https://danishcyberdefence.dk/blog/forticlient_linux"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@fortinet.com","ID":"CVE-2019-15711","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Fortinet FortiClientLinux","version":{"version_data":[{"version_value":"FortiClientLinux 6.2.1 and below"}]}}]},"vendor_name":"Fortinet"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted \"ExportLogs\" type IPC client requests to the fctsched process."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Escalation of privilege"}]}]},"references":{"reference_data":[{"name":"https://fortiguard.com/psirt/FG-IR-19-238","refsource":"CONFIRM","url":"https://fortiguard.com/psirt/FG-IR-19-238"},{"name":"https://danishcyberdefence.dk/blog/forticlient_linux","refsource":"MISC","url":"https://danishcyberdefence.dk/blog/forticlient_linux"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T00:56:22.368Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://fortiguard.com/psirt/FG-IR-19-238"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://danishcyberdefence.dk/blog/forticlient_linux"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-24T20:03:45.552513Z","id":"CVE-2019-15711","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-25T14:27:08.060Z"}}]},"cveMetadata":{"assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","assignerShortName":"fortinet","cveId":"CVE-2019-15711","datePublished":"2020-02-06T15:10:07.000Z","dateReserved":"2019-08-27T00:00:00.000Z","dateUpdated":"2024-10-25T14:27:08.060Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}