CVE-2025-54660

5.5 MEDIUM

📋 TL;DR

An active debug code vulnerability in Fortinet FortiClient for Windows allows local attackers to step through the application execution and retrieve saved VPN user passwords. This affects FortiClientWindows versions 7.4.0-7.4.3, 7.2.0-7.2.10, and all 7.0 versions. Attackers must have local access to the system to exploit this vulnerability.

💻 Affected Systems

Products:
  • Fortinet FortiClientWindows
Versions: 7.4.0 through 7.4.3, 7.2.0 through 7.2.10, 7.0 all versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of FortiClient. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker retrieves saved VPN credentials, potentially gaining unauthorized access to corporate networks or sensitive resources.

🟠

Likely Case

Malicious insider or compromised user account steals VPN credentials for lateral movement or data exfiltration.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to credential exposure on individual endpoints.

🌐 Internet-Facing: LOW - Requires local system access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers or compromised accounts can exploit this to steal VPN credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to run debug tools. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to FortiClientWindows 7.4.4 or later, or 7.2.11 or later

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-844

Restart Required: Yes

Instructions:

1. Download latest FortiClient version from Fortinet support portal. 2. Install update on affected Windows systems. 3. Restart systems to complete installation.

🔧 Temporary Workarounds

Disable saved VPN passwords

windows

Configure FortiClient to not save VPN passwords, requiring manual entry each time.

Configure via FortiClient GUI: VPN settings → disable 'Save password' option

Restrict local access

all

Implement strict local access controls to prevent unauthorized users from accessing systems with FortiClient.

🧯 If You Can't Patch

  • Implement strict local access controls and monitoring on systems with vulnerable FortiClient versions
  • Disable saved VPN passwords and require multi-factor authentication for VPN access

🔍 How to Verify

Check if Vulnerable:

Check FortiClient version via GUI (Help → About) or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Fortinet\FortiClient\Version

Check Version:

reg query "HKLM\SOFTWARE\Fortinet\FortiClient" /v Version

Verify Fix Applied:

Verify version is 7.4.4+ or 7.2.11+ after update. Check that debug functionality is disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process debugging activity
  • Multiple failed VPN authentication attempts after successful credential retrieval

Network Indicators:

  • VPN connections from unusual locations or times
  • Multiple VPN sessions from same credentials

SIEM Query:

Process creation where parent_process contains 'debug' and process_name contains 'FortiClient'

🔗 References

📤 Share & Export