Executive Risk Summary
"A vulnerability in FortiClient Windows 7.4.0 through 7.4.3 and 7.2.0 through 7.2.9 allows an authenticated local user to execute unauthorized code via the fortips driver, requiring a valid and running VPN IPSec connection and bypassing Windows memory protections. Successful exploitation could lead to unauthorized code execution, potentially compromising system security."
Operational Audit Arsenal
Manual Verification Required
This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.
Patch Impact Forecast
VPN and IPSec services may be affected
Internal Work Notes
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Scope of Impact
Original NVD Description
"An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection."