Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47761: Execute unauthorized code or commands in Fortinet FortiClientWindows

0
High
VulnerabilityCVE-2025-47761cvecve-2025-47761
Published: Tue Nov 18 2025 (11/18/2025, 17:01:11 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiClientWindows

Description

An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:57:30 UTC

Technical Analysis

CVE-2025-47761 is a vulnerability identified in Fortinet's FortiClientWindows software versions 7.2.0 through 7.2.9 and 7.4.0 through 7.4.3. The flaw arises from an exposed IOCTL (Input Output Control) interface within the fortips driver component that lacks sufficient access control, classified under CWE-782 (Exposed IOCTL with Insufficient Access Control). This weakness allows an authenticated local user to execute unauthorized code or commands on the affected system. Successful exploitation requires the attacker to have local authentication and an active VPN IPSec connection, which is a prerequisite for interacting with the vulnerable driver. Additionally, the attacker must bypass Windows memory protection mechanisms such as Heap integrity and Hypervisor-protected Code Integrity (HSP), which adds complexity to the attack. The vulnerability impacts the confidentiality, integrity, and availability of the system by enabling privilege escalation and arbitrary code execution. The CVSS v3.1 base score is 7.1, indicating high severity, with attack vector local (AV:L), attack complexity high (AC:H), privileges required low (PR:L), no user interaction (UI:N), and scope changed (S:C). No public exploits have been reported yet, but the vulnerability poses a significant risk to environments where FortiClientWindows is deployed, especially in enterprise VPN scenarios.

Potential Impact

For European organizations, this vulnerability presents a significant risk, particularly for enterprises and government agencies that rely heavily on Fortinet FortiClientWindows for secure VPN connectivity. Exploitation could lead to unauthorized code execution, potentially allowing attackers to escalate privileges, access sensitive data, disrupt services, or move laterally within networks. Confidentiality breaches could expose sensitive corporate or personal data, while integrity and availability impacts could disrupt business operations. The requirement for local authentication and an active VPN IPSec connection somewhat limits the attack surface but does not eliminate risk, especially in environments with many users or shared workstations. Organizations in sectors such as finance, healthcare, critical infrastructure, and government are particularly vulnerable due to the high value of their data and the critical nature of their services. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation attempts.

Mitigation Recommendations

1. Apply patches from Fortinet promptly once they are released to address this vulnerability. 2. Until patches are available, restrict local user privileges to the minimum necessary, preventing unauthorized users from accessing or interacting with the fortips driver. 3. Monitor and audit VPN IPSec connections actively to detect unusual or unauthorized activity. 4. Employ endpoint protection solutions capable of detecting anomalous behavior related to driver interactions or privilege escalation attempts. 5. Implement strict access controls on workstations, including disabling unnecessary local accounts and enforcing strong authentication mechanisms. 6. Use application whitelisting to prevent unauthorized code execution. 7. Educate users about the risks of local privilege misuse and ensure that VPN connections are used securely. 8. Consider network segmentation to limit the impact of a compromised endpoint. 9. Regularly review and update security policies related to VPN usage and local system access. 10. Conduct vulnerability scans and penetration tests focusing on FortiClientWindows deployments to identify exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-05-09T14:40:26.906Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ca897209f2030fa01694f

Added to database: 11/18/2025, 5:10:47 PM

Last enriched: 1/14/2026, 2:57:30 PM

Last updated: 2/7/2026, 1:22:19 PM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats