Executive Risk Summary
"A local low-privilege attacker may exploit the 'Link Following' vulnerability in FortiClient to perform an arbitrary file write with elevated permissions. This vulnerability affects FortiClientWindows versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.12, and all versions of 7.0."
Operational Audit Arsenal
Manual Verification Required
This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.
Patch Impact Forecast
Network and security services may be affected
Internal Work Notes
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Scope of Impact
Original NVD Description
"An Improper Link Resolution Before File Access ('Link Following') vulnerability [CWE-59] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.4, FortiClientWindows 7.2.0 through 7.2.12, FortiClientWindows 7.0 all versions may allow a local low-privilege attacker to perform an arbitrary file write with elevated permissions via crafted named pipe messages."