Named Pipes Improper Access Control

Summary

An authentication bypass using an alternate path or channel vulnerability (CWE-288) in FortiClient (Windows) may allow a low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.

Version Affected Solution
FortiClientWindows 7.4 7.4.0 Upgrade to 7.4.1 or above
FortiClientWindows 7.2 7.2.0 through 7.2.4 Upgrade to 7.2.5 or above
FortiClientWindows 7.0 7.0.0 through 7.0.12 Upgrade to 7.0.13 or above
FortiClientWindows 6.4 6.4 all versions Migrate to a fixed release

Acknowledgement

Fortinet is pleased to thank Nir Chako from Pentera for reporting this vulnerability under responsible disclosure

Timeline

2024-11-12: Initial publication