Home Fortinet CVE-2024-47574
Back to Fortinet

CVE-2024-47574

FortiClient

Fortinet CVSS 7.8 Updated March 15, 2026

Executive Risk Summary

"A low-privilege attacker can bypass authentication in FortiClient Windows versions 7.4.0, 7.2.4 through 7.2.0, 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0, allowing the execution of arbitrary code with high privilege via spoofed named pipe messages. This vulnerability poses a significant risk as it can be exploited to gain elevated access to the system."

Operational Audit Arsenal

Target Type Executable
Target Asset FortiClient.exe
Standard Path %ProgramFiles%\Fortinet\FortiClient

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

Network and security services may be affected

Internal Work Notes

Urgent: FortiClient authentication bypass vulnerability (CVE-2024-47574) - apply latest patch to prevent arbitrary code execution with high privilege

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Forticlient (Version 7.4.0)Forticlient

Original NVD Description

"A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages."

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.