CVE-2025-57716
BaseFortify
Publication date: 2025-10-14
Last updated on: 2025-10-15
Assigner: Fortinet, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fortinet | forticlient | From 7.4.0 (inc) to 7.4.3 (inc) |
| fortinet | forticlient | From 7.4.0 (inc) to 7.4.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Uncontrolled Search Path Element issue (CWE-427) in FortiClient for Windows versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.11, and all 7.0 versions. It allows a local low privileged user to perform a DLL hijacking attack by placing a malicious DLL file into the FortiClient Online Installer installation folder. This means the software might load and execute the malicious DLL instead of the legitimate one, potentially compromising the system.
How can this vulnerability impact me? :
The vulnerability can allow a local low privileged user to execute arbitrary code with potentially higher privileges by tricking FortiClient into loading a malicious DLL. This can lead to compromise of confidentiality, integrity, and availability of the affected system, as indicated by the CVSS score showing high impact on these aspects.