![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZN1H50NTqYS_ryZfZzfex6SwyFW0LCsYk62yDYc1bSjRbP06eM98UbUSPJYbbCQnglmQmMQWnTgMJClH68yIetp5OhDStDnsLU842qbiXZ6xrhOaj3Y9GDB_1_TMUHhN8ffhDedxNcUS4r2H1M6SjOmA3r1QQ7xqKaHoDp7jXzjZ4tNmNNkbOn1pl2Dsk/s1600/fortinet.png)
Fortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution.
Tracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10.
“An Improper Control of Generation of Code (‘Code Injection’) vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to
Source:: The Hackers News