Executive Risk Summary
"A Heap-based Buffer Overflow vulnerability in FortiClient Windows may allow an authenticated local IPSec user to execute arbitrary code or commands. The vulnerability exists in versions 7.4.0 through 7.4.3 and 7.2.0 through 7.2.8, and the attacker would need to bypass Windows heap integrity protections."
Operational Audit Arsenal
Manual Verification Required
This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.
Patch Impact Forecast
IPSec service
Internal Work Notes
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Scope of Impact
Original NVD Description
"A Heap-based Buffer Overflow vulnerability [CWE-122] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.8 may allow an authenticated local IPSec user to execute arbitrary code or commands via "fortips_74.sys". The attacker would need to bypass the Windows heap integrity protections"