DLL hijacking in online installer

Summary

An Uncontrolled Search Path Element vulnerability [CWE-427] in FortiClient Windows may allow a local low privileged user to perform a DLL hijacking attack via placing a malicious DLL to the FortiClient Online Installer installation folder.

Version Affected Solution
FortiClientWindows 7.4 7.4.0 through 7.4.3 Upgrade to 7.4.4 or above
FortiClientWindows 7.2 7.2.0 through 7.2.11 Upgrade to 7.2.12 or above
FortiClientWindows 7.0 7.0 all versions Migrate to a fixed release

Workaround
Ensure that all executables are downloaded directly from Fortinet, and run the installation of FortiClient from a folder non-writeable by regular users.

Acknowledgement

Fortinet is pleased to thank Axel Flamcourt for reporting this vulnerability under responsible disclosure.

Timeline

2025-10-14: Initial publication