Arbitrary memory write via FortIPS driver
Summary
An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] in FortiClient Windows may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection.
| Version | Affected | Solution |
|---|---|---|
| FortiClientWindows 7.4 | 7.4.0 through 7.4.3 | Upgrade to 7.4.4 or above |
| FortiClientWindows 7.2 | 7.2.0 through 7.2.9 | Upgrade to 7.2.10 or above |
The FortiClient Windows free VPN-Only version 7.4.3.1761.1.8758 is containing the patch for this vulnerability.