An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection.
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-112 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Dec 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection. |
20 Nov 2025, 14:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-25-112 - Vendor Advisory | |
| CPE | cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* | |
| First Time |
Fortinet
Fortinet forticlient |
18 Nov 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 17:16
Updated : 2025-12-16 11:15
NVD link : CVE-2025-47761
Mitre link : CVE-2025-47761
CVE.ORG link : CVE-2025-47761
JSON object : View
Products Affected
fortinet
- forticlient
CWE
CWE-782
Exposed IOCTL with Insufficient Access Control
