CVE-2021-43066

8.4 HIGH

📋 TL;DR

This vulnerability in Fortinet FortiClient for Windows allows attackers to escalate privileges via the MSI installer by controlling file names or paths. It affects users running vulnerable versions of FortiClient on Windows systems. Successful exploitation could give attackers administrative access to the system.

💻 Affected Systems

Products:
  • Fortinet FortiClient for Windows
Versions: 7.0.2 and below, 6.4.6 and below, 6.2.9 and below, 6.0.10 and below
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All Windows installations of affected FortiClient versions are vulnerable by default. The vulnerability is in the MSI installer component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full SYSTEM/administrator privileges on the Windows host, enabling complete system compromise, persistence, and lateral movement.

🟠

Likely Case

Local authenticated user or malware with initial access escalates to administrator privileges to install additional malware, disable security controls, or access sensitive data.

🟢

If Mitigated

With proper privilege separation and least privilege principles, impact is limited to the user context, preventing full system compromise.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. The vulnerability is in the installer, suggesting exploitation may involve tricking the installer or modifying installation parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiClient 7.0.3, 6.4.7, 6.2.10, 6.0.11 and later

Vendor Advisory: https://fortiguard.com/advisory/FG-IR-21-154

Restart Required: Yes

Instructions:

1. Download the latest FortiClient version from the official Fortinet portal. 2. Uninstall the current vulnerable version. 3. Install the patched version. 4. Restart the system to ensure all components are updated.

🔧 Temporary Workarounds

Restrict installer permissions

windows

Limit who can run the FortiClient installer and modify installation directories

Use Group Policy to restrict MSI installer execution to administrators only

Implement least privilege

windows

Ensure users operate with minimal necessary privileges to reduce impact

Configure User Account Control (UAC) to highest setting
Use standard user accounts instead of administrator accounts

🧯 If You Can't Patch

  • Remove FortiClient from systems where it's not essential for business operations
  • Implement strict access controls and monitoring on systems with vulnerable FortiClient versions

🔍 How to Verify

Check if Vulnerable:

Check FortiClient version in the application's About section or via 'wmic product get name,version' command

Check Version:

wmic product where "name like 'FortiClient%'" get name,version

Verify Fix Applied:

Verify installed FortiClient version is 7.0.3+, 6.4.7+, 6.2.10+, or 6.0.11+

📡 Detection & Monitoring

Log Indicators:

  • Unusual MSI installer activity in Windows Event Logs (Event ID 11707, 11724)
  • FortiClient installation or repair attempts from non-standard users

Network Indicators:

  • Unusual outbound connections from FortiClient processes post-installation

SIEM Query:

source="windows" AND (event_id=11707 OR event_id=11724) AND process_name="msiexec.exe" AND command_line LIKE "%FortiClient%"

🔗 References

📤 Share & Export