Home Fortinet CVE-2025-47761
Back to Fortinet

CVE-2025-47761

FortiClient - fortips driver

Fortinet CVSS 7.8 Updated March 13, 2026

Executive Risk Summary

"A vulnerability in FortiClient Windows 7.4.0 through 7.4.3 and 7.2.0 through 7.2.9 allows an authenticated local user to execute unauthorized code via the fortips driver, requiring a valid and running VPN IPSec connection and bypassing Windows memory protections. Successful exploitation could lead to unauthorized code execution, potentially compromising system security."

Operational Audit Arsenal

Target Type Driver
Target Asset fortips
Standard Path %windir%System32drivers

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

VPN and IPSec services may be affected

Internal Work Notes

Apply FortiClient update to mitigate Exposed IOCTL with Insufficient Access Control vulnerability, ensuring system security and integrity.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Forticlient

Original NVD Description

"An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection."

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.