FortiClient(All) - Lack of client-side certificate validation using SAML SSO

Summary

An improper certificate validation vulnerability [CWE-295] in FortiClientWindows, FortiClientMac, FortiClientLinux, FortiClientAndroid and FortiClientiOS SAML SSO feature may allow an unauthenticated attacker to man-in-the-middle the communication between the FortiClient and  both the service provider and the identity provider.

Version Affected Solution
FortiClientAndroid 7.2 7.2.0 Upgrade to 7.2.1 or above
FortiClientAndroid 7.0 7.0 all versions Migrate to a fixed release
FortiClientAndroid 6.4 6.4 all versions Migrate to a fixed release
FortiClientAndroid 6.0 6.0 all versions Migrate to a fixed release
FortiClientAndroid 5.6 5.6 all versions Migrate to a fixed release
FortiClientAndroid 5.4 5.4 all versions Migrate to a fixed release
FortiClientAndroid 5.2 5.2 all versions Migrate to a fixed release
FortiClientAndroid 5.0 5.0 all versions Migrate to a fixed release
FortiClientLinux 7.4 Not affected Not Applicable
FortiClientLinux 7.2 7.2.0 through 7.2.4 Upgrade to 7.2.5 or above
FortiClientLinux 7.0 7.0 all versions Migrate to a fixed release
FortiClientLinux 6.4 6.4 all versions Migrate to a fixed release
FortiClientMac 7.4 Not affected Not Applicable
FortiClientMac 7.2 7.2.0 through 7.2.4 Upgrade to 7.2.5 or above
FortiClientMac 7.0 7.0 all versions Migrate to a fixed release
FortiClientMac 6.4 6.4 all versions Migrate to a fixed release
FortiClientWindows 7.2 Not affected Not Applicable
FortiClientWindows 7.0 7.0.0 through 7.0.7 Upgrade to 7.0.8 or above
FortiClientWindows 6.4 6.4 all versions Migrate to a fixed release
FortiClientiOS 7.0 7.0.3 through 7.0.6 Upgrade to 7.0.7 or above
FortiClientiOS 7.0 7.0.0 through 7.0.1 Upgrade to 7.0.7 or above
FortiClientiOS 6.0 6.0.0 through 6.0.1 Migrate to a fixed release
FortiClientiOS 5.6 5.6 all versions Migrate to a fixed release
FortiClientiOS 5.4 5.4 all versions Migrate to a fixed release
FortiClientiOS 5.2 5.2 all versions Migrate to a fixed release
FortiClientiOS 5.0 5.0 all versions Migrate to a fixed release
FortiClientiOS 4.0 4.0 all versions Migrate to a fixed release
FortiClientiOS 2.0 2.0 all versions Migrate to a fixed release

Acknowledgement

Fortinet is pleased to thank Ka Lok WU, Man Hong HUE, Ngai Man POON, Sze Yiu CHAU from the department of Information Engineering, the Chinese University of Hong Kong and Christian Hilgers from indevis for reporting this vulnerability under responsible disclosure.

Timeline

2024-09-10: Initial publication
2025-01-10: Added another reporter