Home

Description

An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection.

PUBLISHED Reserved 2025-05-09 | Published 2025-11-18 | Updated 2025-11-24 | Assigner fortinet




HIGH: 7.1CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:X/RC:R

Problem types

Execute unauthorized code or commands

Product status

Default status
unaffected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

References

fortiguard.fortinet.com/psirt/FG-IR-25-112

cve.org (CVE-2025-47761)

nvd.nist.gov (CVE-2025-47761)

Download JSON