Home Fortinet CVE-2025-46373
Back to Fortinet

CVE-2025-46373

FortiClient - fortips_74.sys

Fortinet CVSS 7.8 Updated March 13, 2026

Executive Risk Summary

"A Heap-based Buffer Overflow vulnerability in FortiClient Windows may allow an authenticated local IPSec user to execute arbitrary code or commands. The vulnerability exists in versions 7.4.0 through 7.4.3 and 7.2.0 through 7.2.8, and the attacker would need to bypass Windows heap integrity protections."

Operational Audit Arsenal

Target Type Driver
Target Asset fortips_74.sys
Standard Path %windir%\System32\drivers

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

IPSec service

Internal Work Notes

Apply FortiClient update to mitigate Heap-based Buffer Overflow vulnerability in fortips_74.sys driver

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Forticlient

Original NVD Description

"A Heap-based Buffer Overflow vulnerability [CWE-122] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.8 may allow an authenticated local IPSec user to execute arbitrary code or commands via "fortips_74.sys". The attacker would need to bypass the Windows heap integrity protections"

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.