Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47761: Execute unauthorized code or commands in Fortinet FortiClientWindows

0
High
VulnerabilityCVE-2025-47761cvecve-2025-47761
Published: Tue Nov 18 2025 (11/18/2025, 17:01:11 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiClientWindows

Description

CVE-2025-47761 is a high-severity vulnerability in Fortinet FortiClientWindows versions 7. 2. 0 through 7. 2. 9 and 7. 4. 0 through 7. 4. 3. It involves an exposed IOCTL interface with insufficient access control that allows an authenticated local user to execute unauthorized code via the fortips driver.

AI-Powered Analysis

AILast updated: 12/23/2025, 10:59:25 UTC

Technical Analysis

CVE-2025-47761 is a vulnerability identified in Fortinet's FortiClientWindows VPN client software versions 7.2.0 through 7.2.9 and 7.4.0 through 7.4.3. The root cause is an exposed IOCTL (Input Output Control) interface within the fortips driver component that lacks sufficient access control, categorized under CWE-782. This flaw allows an authenticated local user—meaning someone with valid credentials and local access—to execute unauthorized code or commands on the affected system. Successful exploitation requires the attacker to have an active VPN IPSec connection, which is a prerequisite to interact with the vulnerable driver. Additionally, the attacker must bypass Windows memory protection mechanisms such as Heap integrity and Hypervisor-protected Code Integrity (HSP), which adds complexity to the attack. The vulnerability affects confidentiality, integrity, and availability by potentially allowing privilege escalation and arbitrary code execution, which could lead to full system compromise. The CVSS v3.1 base score is 7.1, reflecting high severity with attack vector local, high attack complexity, low privileges required, no user interaction, and scope changed. No public exploits or active exploitation in the wild have been reported to date. The vulnerability was reserved in May 2025 and published in November 2025. Fortinet has not yet provided patch links, indicating that remediation may be pending or in progress.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to enterprises and government agencies relying on FortiClientWindows for secure VPN access. Exploitation could allow malicious insiders or compromised local users to escalate privileges and execute arbitrary code, potentially leading to data breaches, disruption of services, or lateral movement within networks. Confidentiality of sensitive data transmitted over VPNs could be compromised, and integrity of endpoint systems undermined. Availability could also be impacted if attackers deploy destructive payloads or disrupt VPN functionality. Organizations in sectors such as finance, healthcare, critical infrastructure, and public administration, which commonly use Fortinet VPN solutions, face heightened risk. The requirement for an active VPN IPSec connection means remote attackers cannot exploit this vulnerability without first establishing a VPN session, somewhat limiting the attack surface but still posing a threat in environments with multiple users sharing endpoints or where endpoints are accessible to untrusted users.

Mitigation Recommendations

1. Apply official patches from Fortinet immediately once they become available to address the exposed IOCTL access control issue. 2. Until patches are released, restrict local user permissions on systems running FortiClientWindows to minimize the number of users who can exploit the vulnerability. 3. Enforce strict endpoint security policies, including application whitelisting and privilege management, to prevent unauthorized code execution. 4. Monitor VPN IPSec connections for unusual activity or unauthorized sessions, as an active VPN connection is required for exploitation. 5. Employ advanced endpoint detection and response (EDR) tools to detect attempts to bypass Windows memory protections such as Heap integrity and HSP. 6. Conduct regular security awareness training to reduce risks from insider threats. 7. Segment networks to limit lateral movement in case of compromise. 8. Review and harden fortips driver access controls if possible through configuration or vendor guidance. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-05-09T14:40:26.906Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ca897209f2030fa01694f

Added to database: 11/18/2025, 5:10:47 PM

Last enriched: 12/23/2025, 10:59:25 AM

Last updated: 1/7/2026, 4:16:47 AM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats