CVE-2024-35282: Information disclosure in Fortinet FortiClientiOS
CVE-2024-35282 is a low-severity vulnerability in Fortinet FortiClient VPN for iOS versions 6. 0 through 7. 2 that allows an unauthenticated attacker with physical access to a jailbroken device to extract cleartext passwords from memory via keychain dump. The flaw arises from cleartext storage of sensitive information in memory, exposing credentials without requiring user interaction or authentication. Exploitation requires the device to be jailbroken, limiting the attack surface. No known exploits are currently in the wild. This vulnerability impacts confidentiality but does not affect integrity or availability. European organizations using FortiClient iOS on jailbroken devices should be aware of this risk and implement mitigations such as restricting device jailbreaking, enforcing strong device security policies, and monitoring for unauthorized access. Patch information is not yet available, so compensating controls are critical. Countries with higher FortiClient adoption and significant VPN usage in regulated sectors are most likely to be affected.
AI Analysis
Technical Summary
CVE-2024-35282 is a vulnerability identified in Fortinet's FortiClient VPN application for iOS, affecting all versions from 6.0.0 through 7.2.0. The vulnerability is due to the cleartext storage of sensitive information—specifically passwords—in device memory, which can be accessed through the iOS keychain. An attacker with physical access to a jailbroken iOS device can perform a keychain dump to retrieve these cleartext credentials without needing any authentication or user interaction. The vulnerability is classified under CWE-316 (Cleartext Storage of Sensitive Information in Memory). The CVSS v3.1 base score is 3.9, reflecting a low severity primarily because exploitation requires physical access and a jailbroken device, which reduces the attack vector. The flaw impacts confidentiality by exposing sensitive credentials but does not affect integrity or availability of the system. No public exploits or active exploitation in the wild have been reported. The vulnerability affects multiple FortiClient iOS versions, indicating a longstanding issue across several releases. Since no patch links are currently available, mitigation relies on device management and security best practices. FortiClient is widely used for secure VPN access, especially in enterprise environments, making this vulnerability relevant for organizations relying on Fortinet's mobile VPN solutions.
Potential Impact
The primary impact of CVE-2024-35282 is the potential disclosure of sensitive VPN credentials stored in cleartext on the device memory of jailbroken iOS devices. For European organizations, this could lead to unauthorized access to corporate VPNs if an attacker gains physical access to an employee's compromised device. This risk is heightened in environments where mobile device management (MDM) policies do not prevent jailbreaking or where devices are used in high-risk physical environments. Confidentiality breaches could expose internal network access, sensitive communications, and potentially lead to lateral movement within corporate networks. However, the requirement for physical access and a jailbroken device limits the scope and likelihood of exploitation. The vulnerability does not affect system integrity or availability, so direct disruption of services is unlikely. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if credential compromise leads to data breaches. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.
Mitigation Recommendations
1. Enforce strict mobile device management (MDM) policies that prohibit jailbreaking and detect jailbroken devices to prevent vulnerable devices from accessing corporate resources. 2. Educate users about the risks of jailbreaking and the importance of maintaining device integrity. 3. Restrict physical access to devices, especially in high-risk environments, to reduce the chance of unauthorized access. 4. Monitor VPN access logs for unusual activity that could indicate credential compromise. 5. Implement multi-factor authentication (MFA) for VPN access to mitigate the impact of credential disclosure. 6. Regularly review and update FortiClient iOS versions and apply patches promptly once available from Fortinet. 7. Consider using additional encryption or secure enclave features where possible to protect sensitive data in memory. 8. Conduct periodic security audits of mobile devices to ensure compliance with security policies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2024-35282: Information disclosure in Fortinet FortiClientiOS
Description
CVE-2024-35282 is a low-severity vulnerability in Fortinet FortiClient VPN for iOS versions 6. 0 through 7. 2 that allows an unauthenticated attacker with physical access to a jailbroken device to extract cleartext passwords from memory via keychain dump. The flaw arises from cleartext storage of sensitive information in memory, exposing credentials without requiring user interaction or authentication. Exploitation requires the device to be jailbroken, limiting the attack surface. No known exploits are currently in the wild. This vulnerability impacts confidentiality but does not affect integrity or availability. European organizations using FortiClient iOS on jailbroken devices should be aware of this risk and implement mitigations such as restricting device jailbreaking, enforcing strong device security policies, and monitoring for unauthorized access. Patch information is not yet available, so compensating controls are critical. Countries with higher FortiClient adoption and significant VPN usage in regulated sectors are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2024-35282 is a vulnerability identified in Fortinet's FortiClient VPN application for iOS, affecting all versions from 6.0.0 through 7.2.0. The vulnerability is due to the cleartext storage of sensitive information—specifically passwords—in device memory, which can be accessed through the iOS keychain. An attacker with physical access to a jailbroken iOS device can perform a keychain dump to retrieve these cleartext credentials without needing any authentication or user interaction. The vulnerability is classified under CWE-316 (Cleartext Storage of Sensitive Information in Memory). The CVSS v3.1 base score is 3.9, reflecting a low severity primarily because exploitation requires physical access and a jailbroken device, which reduces the attack vector. The flaw impacts confidentiality by exposing sensitive credentials but does not affect integrity or availability of the system. No public exploits or active exploitation in the wild have been reported. The vulnerability affects multiple FortiClient iOS versions, indicating a longstanding issue across several releases. Since no patch links are currently available, mitigation relies on device management and security best practices. FortiClient is widely used for secure VPN access, especially in enterprise environments, making this vulnerability relevant for organizations relying on Fortinet's mobile VPN solutions.
Potential Impact
The primary impact of CVE-2024-35282 is the potential disclosure of sensitive VPN credentials stored in cleartext on the device memory of jailbroken iOS devices. For European organizations, this could lead to unauthorized access to corporate VPNs if an attacker gains physical access to an employee's compromised device. This risk is heightened in environments where mobile device management (MDM) policies do not prevent jailbreaking or where devices are used in high-risk physical environments. Confidentiality breaches could expose internal network access, sensitive communications, and potentially lead to lateral movement within corporate networks. However, the requirement for physical access and a jailbroken device limits the scope and likelihood of exploitation. The vulnerability does not affect system integrity or availability, so direct disruption of services is unlikely. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if credential compromise leads to data breaches. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.
Mitigation Recommendations
1. Enforce strict mobile device management (MDM) policies that prohibit jailbreaking and detect jailbroken devices to prevent vulnerable devices from accessing corporate resources. 2. Educate users about the risks of jailbreaking and the importance of maintaining device integrity. 3. Restrict physical access to devices, especially in high-risk environments, to reduce the chance of unauthorized access. 4. Monitor VPN access logs for unusual activity that could indicate credential compromise. 5. Implement multi-factor authentication (MFA) for VPN access to mitigate the impact of credential disclosure. 6. Regularly review and update FortiClient iOS versions and apply patches promptly once available from Fortinet. 7. Consider using additional encryption or secure enclave features where possible to protect sensitive data in memory. 8. Conduct periodic security audits of mobile devices to ensure compliance with security policies.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2024-05-14T21:15:19.191Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696762bf8330e06716573507
Added to database: 1/14/2026, 9:32:47 AM
Last enriched: 1/14/2026, 9:47:32 AM
Last updated: 1/14/2026, 10:35:49 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0532: CWE-918 Server-Side Request Forgery (SSRF) in Elastic Kibana
HighCVE-2026-0529: CWE-129 Improper Validation of Array Index in Elastic Packetbeat
MediumCVE-2024-46669: Denial of service in Fortinet FortiOS
LowCVE-2024-46668: Denial of service in Fortinet FortiOS
HighCVE-2026-0813: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prasannasp Short Link
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.