CVE-2022-26113

7.7 HIGH

📋 TL;DR

This vulnerability in FortiClient for Windows allows a local attacker to write arbitrary files to the system due to unnecessary privileges. It affects FortiClient versions 7.0.0-7.0.3, 6.4.0-6.4.7, 6.2.0-6.2.9, and 6.0.0-6.0.10. Attackers must have local access to exploit this privilege escalation flaw.

💻 Affected Systems

Products:
  • FortiClient for Windows
Versions: 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.10
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected FortiClient versions on Windows are vulnerable. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could write malicious files to system directories, potentially leading to full system compromise, persistence mechanisms, or disabling security controls.

🟠

Likely Case

Local privilege escalation allowing attackers to modify system files, install malware, or tamper with security configurations.

🟢

If Mitigated

Limited impact if proper access controls and least privilege principles are enforced, though local file writes could still occur.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring attacker to have local access to the system.
🏢 Internal Only: HIGH - Any compromised user account or insider threat could exploit this to escalate privileges and compromise the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but appears to be straightforward based on the vulnerability description. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions 7.0.4, 6.4.8, 6.2.10, and 6.0.11

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-22-044

Restart Required: Yes

Instructions:

1. Download the latest FortiClient version from the official Fortinet support portal. 2. Uninstall the current vulnerable version. 3. Install the patched version (7.0.4, 6.4.8, 6.2.10, or 6.0.11). 4. Restart the system to complete the installation.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit local access to systems running FortiClient to only authorized users

Apply Least Privilege

windows

Ensure users have minimal necessary privileges to reduce impact if exploited

🧯 If You Can't Patch

  • Monitor for suspicious file write activities in system directories
  • Implement application whitelisting to prevent unauthorized executables from running

🔍 How to Verify

Check if Vulnerable:

Check FortiClient version in the application interface or via 'wmic product get name,version' command and compare against affected versions.

Check Version:

wmic product where "name like 'FortiClient%'" get name,version

Verify Fix Applied:

Verify FortiClient version is 7.0.4, 6.4.8, 6.2.10, or 6.0.11 or higher in the application interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations in system directories
  • FortiClient service or process anomalies
  • Privilege escalation attempts

Network Indicators:

  • None - this is a local attack

SIEM Query:

EventID=4663 OR EventID=4656 with TargetObject containing system directories and ProcessName containing FortiClient

🔗 References

📤 Share & Export