PSIRT Advisories

FortiClient - Privilege escalation in FortiClient installer

Summary

An external control of file name or path vulnerability [CWE-73] in FortiClient Windows may allow an unprivileged attacker to delete or execute files with admin rights via the MSI installer.

Affected Products

FortiClientWindows version 6.0.X
FortiClientWindows version 6.2.X
FortiClientWindows version 6.4.0 through 6.4.6
FortiClientWindows version 7.0.0 through 7.0.2

Solutions

Upgrade to FortiClient 7.0.3 or above
Upgrade to FortiClient 6.4.7 or above

Acknowledgement

Ilias Dimopoulos of RedyOps Research Labs