Integer Overflow on SSL-VPN bookmarks

Summary

An Integer Overflow or Wraparound vulnerability [CWE-190] in FortiOS, FortiPAM and FortiProxy SSL-VPN RDP and VNC bookmarks may allow an authenticated user to affect the device SSL-VPN availability via crafted requests.

Version Affected Solution
FortiOS 7.6 7.6.0 through 7.6.2 Upgrade to 7.6.3 or above
FortiOS 7.4 7.4.0 through 7.4.7 Upgrade to 7.4.8 or above
FortiOS 7.2 7.2.0 through 7.2.10 Upgrade to 7.2.11 or above
FortiOS 7.0 7.0 all versions Migrate to a fixed release
FortiOS 6.4 6.4 all versions Migrate to a fixed release
FortiPAM 1.7 Not affected Not Applicable
FortiPAM 1.6 Not affected Not Applicable
FortiPAM 1.5 1.5.0 Upgrade to 1.5.1 or above
FortiPAM 1.4 1.4.0 through 1.4.2 Upgrade to 1.4.3 or above
FortiPAM 1.3 1.3 all versions Migrate to a fixed release
FortiPAM 1.2 1.2 all versions Migrate to a fixed release
FortiPAM 1.1 1.1 all versions Migrate to a fixed release
FortiPAM 1.0 1.0 all versions Migrate to a fixed release
FortiProxy 7.6 7.6.0 through 7.6.2 Upgrade to 7.6.3 or above
FortiProxy 7.4 7.4.0 through 7.4.3 Upgrade to 7.4.4 or above
FortiProxy 7.2 7.2 all versions Migrate to a fixed release
FortiProxy 7.0 7.0 all versions Migrate to a fixed release
FortiProxy 2.0 2.0 all versions Migrate to a fixed release
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Acknowledgement

Fortinet is pleased to thank Vang3lis and TangentHuang from VARAS@IIE for reporting this vulnerability under responsible disclosure.

Timeline

2025-08-12: Initial publication