CVE-2025-47761

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated local users on Windows systems to execute arbitrary code through FortiClient's fortips driver when an IPSec VPN connection is active. It affects FortiClientWindows versions 7.4.0-7.4.3 and 7.2.0-7.2.9. Attackers must bypass Windows memory protections and have a valid VPN connection to exploit this exposed IOCTL with insufficient access control.

💻 Affected Systems

Products:
  • Fortinet FortiClientWindows
Versions: 7.4.0 through 7.4.3, 7.2.0 through 7.2.9
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires a valid and running VPN IPSec connection for successful exploitation. Windows memory protections (Heap integrity and HSP) must be bypassed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with local privilege escalation to SYSTEM, enabling persistence, credential theft, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative privileges on the compromised workstation.

🟢

If Mitigated

Limited impact due to Windows memory protections and VPN connection requirement, potentially resulting in failed exploitation attempts.

🌐 Internet-Facing: LOW - Requires local authenticated access and VPN connection, not directly exploitable from internet.
🏢 Internal Only: HIGH - Authenticated local users can exploit this to gain elevated privileges on corporate workstations with FortiClient installed.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access, bypassing Windows memory protections, and an active IPSec VPN connection. Not trivial but feasible for determined attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 7.4.3 and 7.2.9 (check vendor advisory for specific fixed versions)

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-112

Restart Required: Yes

Instructions:

1. Download latest FortiClient version from Fortinet support portal. 2. Uninstall current vulnerable version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Disable IPSec VPN connections

windows

Prevent exploitation by disabling IPSec VPN functionality which is required for the attack.

Configure FortiClient to use SSL VPN instead of IPSec or disable VPN functionality entirely

Restrict local user privileges

windows

Limit local user accounts to standard user privileges to reduce attack surface.

Use Group Policy to enforce least privilege for local user accounts

🧯 If You Can't Patch

  • Implement strict endpoint security controls to detect and prevent memory manipulation attempts
  • Segment network to limit lateral movement from compromised workstations

🔍 How to Verify

Check if Vulnerable:

Check FortiClient version in About section or via 'wmic product get name,version' for FortiClient entries.

Check Version:

wmic product where "name like '%FortiClient%'" get name,version

Verify Fix Applied:

Verify FortiClient version is above 7.4.3 or 7.2.9, and check vendor advisory for specific fixed versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from FortiClient processes
  • Suspicious driver access attempts
  • Failed memory protection bypass attempts in Windows logs

Network Indicators:

  • Unusual outbound connections from workstations with FortiClient
  • Anomalous VPN connection patterns

SIEM Query:

Process Creation where (Image contains 'forti' OR ParentImage contains 'forti') AND CommandLine contains suspicious patterns

🔗 References

📤 Share & Export