Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35282: Information disclosure in Fortinet FortiClientiOS

0
Low
VulnerabilityCVE-2024-35282cvecve-2024-35282
Published: Tue Sep 10 2024 (09/10/2024, 14:37:46 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiClientiOS

Description

CVE-2024-35282 is a low-severity vulnerability in Fortinet FortiClient VPN for iOS versions 6. 0 through 7. 2 that allows an unauthenticated attacker with physical access to a jailbroken device to extract cleartext passwords from memory via keychain dump. The flaw arises from cleartext storage of sensitive information in memory, exposing credentials without requiring user interaction or authentication. Exploitation requires the device to be jailbroken, limiting the attack surface. No known exploits are currently in the wild. This vulnerability impacts confidentiality but does not affect integrity or availability. European organizations using FortiClient iOS on jailbroken devices should be aware of this risk and implement mitigations such as restricting device jailbreaking, enforcing strong device security policies, and monitoring for unauthorized access. Patch information is not yet available, so compensating controls are critical. Countries with higher FortiClient adoption and significant VPN usage in regulated sectors are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/14/2026, 09:47:32 UTC

Technical Analysis

CVE-2024-35282 is a vulnerability identified in Fortinet's FortiClient VPN application for iOS, affecting all versions from 6.0.0 through 7.2.0. The vulnerability is due to the cleartext storage of sensitive information—specifically passwords—in device memory, which can be accessed through the iOS keychain. An attacker with physical access to a jailbroken iOS device can perform a keychain dump to retrieve these cleartext credentials without needing any authentication or user interaction. The vulnerability is classified under CWE-316 (Cleartext Storage of Sensitive Information in Memory). The CVSS v3.1 base score is 3.9, reflecting a low severity primarily because exploitation requires physical access and a jailbroken device, which reduces the attack vector. The flaw impacts confidentiality by exposing sensitive credentials but does not affect integrity or availability of the system. No public exploits or active exploitation in the wild have been reported. The vulnerability affects multiple FortiClient iOS versions, indicating a longstanding issue across several releases. Since no patch links are currently available, mitigation relies on device management and security best practices. FortiClient is widely used for secure VPN access, especially in enterprise environments, making this vulnerability relevant for organizations relying on Fortinet's mobile VPN solutions.

Potential Impact

The primary impact of CVE-2024-35282 is the potential disclosure of sensitive VPN credentials stored in cleartext on the device memory of jailbroken iOS devices. For European organizations, this could lead to unauthorized access to corporate VPNs if an attacker gains physical access to an employee's compromised device. This risk is heightened in environments where mobile device management (MDM) policies do not prevent jailbreaking or where devices are used in high-risk physical environments. Confidentiality breaches could expose internal network access, sensitive communications, and potentially lead to lateral movement within corporate networks. However, the requirement for physical access and a jailbroken device limits the scope and likelihood of exploitation. The vulnerability does not affect system integrity or availability, so direct disruption of services is unlikely. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if credential compromise leads to data breaches. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.

Mitigation Recommendations

1. Enforce strict mobile device management (MDM) policies that prohibit jailbreaking and detect jailbroken devices to prevent vulnerable devices from accessing corporate resources. 2. Educate users about the risks of jailbreaking and the importance of maintaining device integrity. 3. Restrict physical access to devices, especially in high-risk environments, to reduce the chance of unauthorized access. 4. Monitor VPN access logs for unusual activity that could indicate credential compromise. 5. Implement multi-factor authentication (MFA) for VPN access to mitigate the impact of credential disclosure. 6. Regularly review and update FortiClient iOS versions and apply patches promptly once available from Fortinet. 7. Consider using additional encryption or secure enclave features where possible to protect sensitive data in memory. 8. Conduct periodic security audits of mobile devices to ensure compliance with security policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2024-05-14T21:15:19.191Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696762bf8330e06716573507

Added to database: 1/14/2026, 9:32:47 AM

Last enriched: 1/14/2026, 9:47:32 AM

Last updated: 1/14/2026, 10:35:49 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats