{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-16T07:51:37.723","vulnerabilities":[{"cve":{"id":"CVE-2026-24018","sourceIdentifier":"psirt@fortinet.com","published":"2026-03-10T18:18:17.560","lastModified":"2026-03-13T19:04:40.047","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLinux 7.4.0 through 7.4.4, FortiClientLinux 7.2.2 through 7.2.12 may allow a local and unprivileged user to escalate their privileges to root."},{"lang":"es","value":"Una vulnerabilidad de seguimiento de enlaces simbólicos (Symlink) de UNIX en Fortinet FortiClientLinux 7.4.0 hasta 7.4.4, FortiClientLinux 7.2.2 hasta 7.2.12 puede permitir a un usuario local y no privilegiado escalar sus privilegios a root."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Primary","description":[{"lang":"en","value":"CWE-61"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*","versionStartIncluding":"7.2.2","versionEndExcluding":"7.2.13","matchCriteriaId":"C00E2D97-4175-47C4-82F0-BB30DD1B8314"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*","versionStartIncluding":"7.4.0","versionEndExcluding":"7.4.5","matchCriteriaId":"022517B5-255A-4794-9813-2987CDBDAC43"}]}]}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-083","source":"psirt@fortinet.com","tags":["Vendor Advisory"]}]}}]}