{"vulnerability": "CVE-2024-50564", "sightings": [{"uuid": "d115a904-4ab0-4fff-9aef-89bc394abb04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50564", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfpieetf7q2h", "content": "", "creation_timestamp": "2025-01-14T14:43:15.532025Z"}, {"uuid": "0d7bc277-b708-4479-a46a-57c15d34c828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50564", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113827355879730690", "content": "", "creation_timestamp": "2025-01-14T15:13:34.196580Z"}, {"uuid": "86f3a27c-944a-4d8e-9fcc-3d80f7edbb9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50564", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpgx5cs2b2r", "content": "", "creation_timestamp": "2025-01-14T14:17:57.361999Z"}, {"uuid": "2f107fc4-fab8-45af-af45-9fd399bc1a14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50564", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113827650434596500", "content": "", "creation_timestamp": "2025-01-14T16:28:27.939998Z"}, {"uuid": "77ed2924-246a-4c40-b2c6-56f1bba41fb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50564", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1772", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50564\n\ud83d\udd39 Description: A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.\n\ud83d\udccf Published: 2025-01-14T14:09:49.460Z\n\ud83d\udccf Modified: 2025-01-15T14:53:40.154Z\n\ud83d\udd17 References:\n1. https://fortiguard.fortinet.com/psirt/FG-IR-24-216", "creation_timestamp": "2025-01-15T15:10:57.000000Z"}, {"uuid": "a01b98cb-4d9a-4a4f-a901-951b11ed74cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50564", "type": "seen", "source": "https://t.me/cvedetector/15257", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50564 - Fortinet FortiClient Hard-Coded Cryptographic Key Vulnerability (Decryption)\", \n  \"Content\": \"CVE ID : CVE-2024-50564 \nPublished : Jan. 14, 2025, 2:15 p.m. | 21\u00a0minutes ago \nDescription : A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T15:39:40.000000Z"}, {"uuid": "ea86bdb9-d857-44fe-b950-065bb3e8ae32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50564", "type": "seen", "source": "Telegram/rYdhs5hNRXQkDPmKnNp9doHTxnpDxpECfhMpMzYUW0HV2q04", "content": "", "creation_timestamp": "2025-02-06T02:40:20.000000Z"}]}