Tag
An authenticated remote attacker can exploit a vulnerability in Fortinet FortiOS to escalate their privileges.