Arbitrary memory write via FortIPS driver

Summary

An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] in FortiClient Windows may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection.

Version Affected Solution
FortiClientWindows 7.4 7.4.0 through 7.4.3 Upgrade to 7.4.4 or above
FortiClientWindows 7.2 7.2.0 through 7.2.9 Upgrade to 7.2.10 or above

The FortiClient Windows free VPN-Only version 7.4.3.1761.1.8758 is containing the patch for this vulnerability.

Acknowledgement

Fortinet is pleased to thank Alex of HackerHood Research Group for reporting this vulnerability under responsible disclosure.

Timeline

2025-11-18: Initial publication