DLL hijacking in online installer
Summary
An Uncontrolled Search Path Element vulnerability [CWE-427] in FortiClient Windows may allow a local low privileged user to perform a DLL hijacking attack via placing a malicious DLL to the FortiClient Online Installer installation folder.
| Version | Affected | Solution |
|---|---|---|
| FortiClientWindows 7.4 | 7.4.0 through 7.4.3 | Upgrade to 7.4.4 or above |
| FortiClientWindows 7.2 | 7.2.0 through 7.2.11 | Upgrade to 7.2.12 or above |
| FortiClientWindows 7.0 | 7.0 all versions | Migrate to a fixed release |
Workaround
Ensure that all executables are downloaded directly from Fortinet, and run the installation of FortiClient from a folder non-writeable by regular users.