Buffer Overflow via fortips driver

Summary

A Heap-based Buffer Overflow vulnerability [CWE-122] in FortiClient Windows may allow an authenticated local IPSec user to execute arbitrary code or commands via "fortips_74.sys" driver. The attacker would need to bypass the Windows heap integrity protections.

Version Affected Solution
FortiClientWindows 7.4 7.4.0 through 7.4.3 Upgrade to 7.4.4 or above
FortiClientWindows 7.2 7.2.0 through 7.2.8 Upgrade to 7.2.9 or above

The FortiClient Windows free VPN-Only version 7.4.3.1761.1.8758 is containing the patch for this vulnerability.

Acknowledgement

Fortinet is pleased to thank Alex from Ch Service Srl for reporting this vulnerability under responsible disclosure.

Timeline

2025-11-18: Initial publication