CVE-2025-24473: Information disclosure in Fortinet FortiClientWindows
A exposure of sensitive system information to an unauthorized control sphere vulnerability in Fortinet FortiClientWindows 7.2.0 through 7.2.1, FortiClientWindows 7.0.13 through 7.0.14 may allow an unauthorized remote attacker to view application information via navigation to a hosted webpage, if Windows is configured to accept incoming connections to port 8053 (non-default setup)
AI Analysis
Technical Summary
CVE-2025-24473 is an information disclosure vulnerability identified in Fortinet's FortiClientWindows software versions 7.2.0 through 7.2.1 and 7.0.13 through 7.0.14. The vulnerability arises due to improper access controls on a service listening on TCP port 8053, which is not enabled by default in Windows environments. When Windows is configured to accept incoming connections on this port, an unauthorized remote attacker can remotely access a hosted webpage that reveals sensitive application information. This exposure could include details about the FortiClient application or system configuration that could aid further attacks. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. However, the attack complexity is higher due to the prerequisite of a non-default network configuration (port 8053 open). The CVSS v3.1 base score is 4.8, reflecting a medium severity level primarily due to limited impact (confidentiality only) and higher attack complexity. No integrity or availability impacts are reported, and no known active exploits have been documented. The vulnerability was reserved in January 2025 and published in May 2025. Fortinet has not yet provided patch links, so organizations should monitor for updates. This vulnerability is particularly relevant for environments where FortiClientWindows is deployed and Windows systems are configured to accept incoming connections on port 8053, which may occur in specialized or misconfigured setups.
Potential Impact
For European organizations, the primary impact of CVE-2025-24473 is the unauthorized disclosure of sensitive FortiClientWindows application information, which could facilitate reconnaissance and subsequent targeted attacks. While the vulnerability does not directly compromise system integrity or availability, the leaked information could be leveraged by attackers to identify weaknesses or plan more sophisticated intrusions. Organizations in critical infrastructure sectors such as finance, healthcare, and government, which often deploy Fortinet products for endpoint security, may face increased risk if their Windows systems have port 8053 exposed. The requirement for a non-default port configuration reduces the likelihood of widespread exploitation but does not eliminate risk, especially in complex enterprise networks where custom firewall rules or network services might open this port. The absence of known exploits in the wild suggests limited immediate threat; however, the medium severity rating calls for proactive mitigation to prevent potential exploitation. Data privacy regulations in Europe, such as GDPR, may also increase the compliance risk if sensitive information is leaked due to this vulnerability.
Mitigation Recommendations
European organizations should immediately audit their Windows endpoint configurations to verify whether port 8053 is open to incoming connections. If this port is not explicitly required for business operations, it should be closed or blocked at the firewall level to eliminate exposure. Network segmentation and strict access control lists should be enforced to limit external access to internal endpoints running FortiClientWindows. Administrators should monitor network traffic for unusual connections targeting port 8053. Fortinet customers must track vendor communications closely and apply security patches or updates promptly once released. Additionally, organizations should review FortiClientWindows deployment policies to ensure default configurations are maintained and avoid unnecessary exposure of non-standard ports. Implementing endpoint detection and response (EDR) solutions can help identify suspicious activities related to attempts to exploit this vulnerability. Finally, security awareness training should remind IT staff to avoid enabling non-default ports without thorough risk assessment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Switzerland
CVE-2025-24473: Information disclosure in Fortinet FortiClientWindows
Description
A exposure of sensitive system information to an unauthorized control sphere vulnerability in Fortinet FortiClientWindows 7.2.0 through 7.2.1, FortiClientWindows 7.0.13 through 7.0.14 may allow an unauthorized remote attacker to view application information via navigation to a hosted webpage, if Windows is configured to accept incoming connections to port 8053 (non-default setup)
AI-Powered Analysis
Technical Analysis
CVE-2025-24473 is an information disclosure vulnerability identified in Fortinet's FortiClientWindows software versions 7.2.0 through 7.2.1 and 7.0.13 through 7.0.14. The vulnerability arises due to improper access controls on a service listening on TCP port 8053, which is not enabled by default in Windows environments. When Windows is configured to accept incoming connections on this port, an unauthorized remote attacker can remotely access a hosted webpage that reveals sensitive application information. This exposure could include details about the FortiClient application or system configuration that could aid further attacks. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. However, the attack complexity is higher due to the prerequisite of a non-default network configuration (port 8053 open). The CVSS v3.1 base score is 4.8, reflecting a medium severity level primarily due to limited impact (confidentiality only) and higher attack complexity. No integrity or availability impacts are reported, and no known active exploits have been documented. The vulnerability was reserved in January 2025 and published in May 2025. Fortinet has not yet provided patch links, so organizations should monitor for updates. This vulnerability is particularly relevant for environments where FortiClientWindows is deployed and Windows systems are configured to accept incoming connections on port 8053, which may occur in specialized or misconfigured setups.
Potential Impact
For European organizations, the primary impact of CVE-2025-24473 is the unauthorized disclosure of sensitive FortiClientWindows application information, which could facilitate reconnaissance and subsequent targeted attacks. While the vulnerability does not directly compromise system integrity or availability, the leaked information could be leveraged by attackers to identify weaknesses or plan more sophisticated intrusions. Organizations in critical infrastructure sectors such as finance, healthcare, and government, which often deploy Fortinet products for endpoint security, may face increased risk if their Windows systems have port 8053 exposed. The requirement for a non-default port configuration reduces the likelihood of widespread exploitation but does not eliminate risk, especially in complex enterprise networks where custom firewall rules or network services might open this port. The absence of known exploits in the wild suggests limited immediate threat; however, the medium severity rating calls for proactive mitigation to prevent potential exploitation. Data privacy regulations in Europe, such as GDPR, may also increase the compliance risk if sensitive information is leaked due to this vulnerability.
Mitigation Recommendations
European organizations should immediately audit their Windows endpoint configurations to verify whether port 8053 is open to incoming connections. If this port is not explicitly required for business operations, it should be closed or blocked at the firewall level to eliminate exposure. Network segmentation and strict access control lists should be enforced to limit external access to internal endpoints running FortiClientWindows. Administrators should monitor network traffic for unusual connections targeting port 8053. Fortinet customers must track vendor communications closely and apply security patches or updates promptly once released. Additionally, organizations should review FortiClientWindows deployment policies to ensure default configurations are maintained and avoid unnecessary exposure of non-standard ports. Implementing endpoint detection and response (EDR) solutions can help identify suspicious activities related to attempts to exploit this vulnerability. Finally, security awareness training should remind IT staff to avoid enabling non-default ports without thorough risk assessment.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-01-21T20:48:07.886Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6836c5ad182aa0cae23deabb
Added to database: 5/28/2025, 8:13:33 AM
Last enriched: 1/17/2026, 7:39:15 AM
Last updated: 2/7/2026, 1:17:15 PM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Organizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.