An active debug code vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.10, FortiClientWindows 7.0 all versions may allow a local attacker to run the application step by step and retrieve the saved VPN user password
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-844 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2025, 14:35
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* | |
| First Time |
Fortinet forticlient
Fortinet |
|
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-25-844 - Vendor Advisory |
18 Nov 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 17:16
Updated : 2025-11-20 14:35
NVD link : CVE-2025-54660
Mitre link : CVE-2025-54660
CVE.ORG link : CVE-2025-54660
JSON object : View
Products Affected
fortinet
- forticlient
CWE
CWE-489
Active Debug Code
