Home Fortinet CVE-2024-36507
Back to Fortinet

CVE-2024-36507

FortiClient

Fortinet CVSS 7.3 Updated March 15, 2026

Executive Risk Summary

"A vulnerability in Fortinet FortiClient Windows versions 7.4.0, 7.2.4 through 7.2.0, and 7.0.12 through 7.0.0 allows an attacker to run arbitrary code via DLL hijacking and social engineering, potentially leading to system compromise. This vulnerability can be exploited by an attacker to gain unauthorized access to the system, making it a critical risk."

Operational Audit Arsenal

Target Type DLL
Target Asset Unknown
Standard Path %windir%\System32

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

Network and system services may be affected

Internal Work Notes

High-risk vulnerability in FortiClient Windows, requiring immediate patching to prevent potential system compromise via DLL hijacking and social engineering.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Forticlient (Version 7.4.0)Forticlient

Original NVD Description

"A untrusted search path in Fortinet FortiClientWindows versions 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0 allows an attacker to run arbitrary code via DLL hijacking and social engineering."

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.