Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24473: Information disclosure in Fortinet FortiClientWindows

0
Medium
VulnerabilityCVE-2025-24473cvecve-2025-24473
Published: Wed May 28 2025 (05/28/2025, 07:55:57 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiClientWindows

Description

A exposure of sensitive system information to an unauthorized control sphere vulnerability in Fortinet FortiClientWindows 7.2.0 through 7.2.1, FortiClientWindows 7.0.13 through 7.0.14 may allow an unauthorized remote attacker to view application information via navigation to a hosted webpage, if Windows is configured to accept incoming connections to port 8053 (non-default setup)

AI-Powered Analysis

AILast updated: 01/17/2026, 07:39:15 UTC

Technical Analysis

CVE-2025-24473 is an information disclosure vulnerability identified in Fortinet's FortiClientWindows software versions 7.2.0 through 7.2.1 and 7.0.13 through 7.0.14. The vulnerability arises due to improper access controls on a service listening on TCP port 8053, which is not enabled by default in Windows environments. When Windows is configured to accept incoming connections on this port, an unauthorized remote attacker can remotely access a hosted webpage that reveals sensitive application information. This exposure could include details about the FortiClient application or system configuration that could aid further attacks. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. However, the attack complexity is higher due to the prerequisite of a non-default network configuration (port 8053 open). The CVSS v3.1 base score is 4.8, reflecting a medium severity level primarily due to limited impact (confidentiality only) and higher attack complexity. No integrity or availability impacts are reported, and no known active exploits have been documented. The vulnerability was reserved in January 2025 and published in May 2025. Fortinet has not yet provided patch links, so organizations should monitor for updates. This vulnerability is particularly relevant for environments where FortiClientWindows is deployed and Windows systems are configured to accept incoming connections on port 8053, which may occur in specialized or misconfigured setups.

Potential Impact

For European organizations, the primary impact of CVE-2025-24473 is the unauthorized disclosure of sensitive FortiClientWindows application information, which could facilitate reconnaissance and subsequent targeted attacks. While the vulnerability does not directly compromise system integrity or availability, the leaked information could be leveraged by attackers to identify weaknesses or plan more sophisticated intrusions. Organizations in critical infrastructure sectors such as finance, healthcare, and government, which often deploy Fortinet products for endpoint security, may face increased risk if their Windows systems have port 8053 exposed. The requirement for a non-default port configuration reduces the likelihood of widespread exploitation but does not eliminate risk, especially in complex enterprise networks where custom firewall rules or network services might open this port. The absence of known exploits in the wild suggests limited immediate threat; however, the medium severity rating calls for proactive mitigation to prevent potential exploitation. Data privacy regulations in Europe, such as GDPR, may also increase the compliance risk if sensitive information is leaked due to this vulnerability.

Mitigation Recommendations

European organizations should immediately audit their Windows endpoint configurations to verify whether port 8053 is open to incoming connections. If this port is not explicitly required for business operations, it should be closed or blocked at the firewall level to eliminate exposure. Network segmentation and strict access control lists should be enforced to limit external access to internal endpoints running FortiClientWindows. Administrators should monitor network traffic for unusual connections targeting port 8053. Fortinet customers must track vendor communications closely and apply security patches or updates promptly once released. Additionally, organizations should review FortiClientWindows deployment policies to ensure default configurations are maintained and avoid unnecessary exposure of non-standard ports. Implementing endpoint detection and response (EDR) solutions can help identify suspicious activities related to attempts to exploit this vulnerability. Finally, security awareness training should remind IT staff to avoid enabling non-default ports without thorough risk assessment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-01-21T20:48:07.886Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6836c5ad182aa0cae23deabb

Added to database: 5/28/2025, 8:13:33 AM

Last enriched: 1/17/2026, 7:39:15 AM

Last updated: 2/7/2026, 1:17:15 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats