CVE-2025-47761

An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*

History

20 Nov 2025, 14:35

Type Values Removed Values Added
First Time Fortinet forticlient
Fortinet
CPE cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*
References () https://fortiguard.fortinet.com/psirt/FG-IR-25-112 - () https://fortiguard.fortinet.com/psirt/FG-IR-25-112 - Vendor Advisory

18 Nov 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-18 17:16

Updated : 2025-11-20 14:35


NVD link : CVE-2025-47761

Mitre link : CVE-2025-47761

CVE.ORG link : CVE-2025-47761


JSON object : View

Products Affected

fortinet

  • forticlient
CWE
CWE-782

Exposed IOCTL with Insufficient Access Control