Home Fortinet CVE-2024-36513
Back to Fortinet

CVE-2024-36513

FortiClient

Fortinet CVSS 8.2 Updated March 15, 2026

Executive Risk Summary

"A privilege context switching error vulnerability in FortiClient Windows versions 7.2.4 and below, 7.0.12 and below, and 6.4 all versions may allow an authenticated user to escalate their privileges via lua auto patch scripts. This vulnerability could potentially lead to unauthorized access and control of the system."

Operational Audit Arsenal

Target Type Executable
Target Asset FortiClient.exe
Standard Path %ProgramFiles%\FortiClient

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

Network and security services may be affected

Internal Work Notes

FortiClient privilege escalation vulnerability - apply latest patch to prevent unauthorized access

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Forticlient

Original NVD Description

"A privilege context switching error vulnerability [CWE-270] in FortiClient Windows version 7.2.4 and below, version 7.0.12 and below, 6.4 all versions may allow an authenticated user to escalate their privileges via lua auto patch scripts."

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.