CVE-2025-47761
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-12-16
Assigner: Fortinet, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fortinet | forticlient | From 7.4.0 (inc) to 7.4.3 (inc) |
| fortinet | forticlient | From 7.4.0 (inc) to 7.4.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-782 | The product implements an IOCTL with functionality that should be restricted, but it does not properly enforce access control for the IOCTL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an exposed IOCTL with insufficient access control in Fortinet FortiClientWindows versions 7.4.0 through 7.4.3 and 7.2.0 through 7.2.9. It may allow an authenticated local user to execute unauthorized code via the fortips driver. Exploiting this vulnerability requires bypassing Windows memory protections such as Heap integrity and HSP, and a valid, running VPN IPSec connection is also necessary.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an authenticated local user to execute unauthorized code with high impact on confidentiality, integrity, and availability of the system. This could lead to unauthorized access, data manipulation, or disruption of services on the affected system.