An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection.
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-112 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2025, 14:35
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Fortinet forticlient
Fortinet |
|
| CPE | cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* | |
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-25-112 - Vendor Advisory |
18 Nov 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 17:16
Updated : 2025-11-20 14:35
NVD link : CVE-2025-47761
Mitre link : CVE-2025-47761
CVE.ORG link : CVE-2025-47761
JSON object : View
Products Affected
fortinet
- forticlient
CWE
CWE-782
Exposed IOCTL with Insufficient Access Control
