Authenticated Heap Overflow in SSL-VPN bookmarks

Summary

An Heap-based Buffer Overflow vulnerability [CWE-122] in FortiOS, FortiPAM and FortiProxy RDP bookmark connection may allow an authenticated user to execute unauthorized code via crafted requests.

Version Affected Solution
FortiOS 7.6 7.6.0 through 7.6.2 Upgrade to 7.6.3 or above
FortiOS 7.4 7.4.0 through 7.4.7 Upgrade to 7.4.8 or above
FortiOS 7.2 7.2.0 through 7.2.10 Upgrade to 7.2.11 or above
FortiOS 7.0 7.0 all versions Migrate to a fixed release
FortiOS 6.4 6.4 all versions Migrate to a fixed release
FortiPAM 1.7 Not affected Not Applicable
FortiPAM 1.6 Not affected Not Applicable
FortiPAM 1.5 1.5.0 Upgrade to 1.5.1 or above
FortiPAM 1.4 1.4.0 through 1.4.2 Upgrade to 1.4.3 or above
FortiPAM 1.3 1.3 all versions Migrate to a fixed release
FortiPAM 1.2 1.2 all versions Migrate to a fixed release
FortiPAM 1.1 1.1 all versions Migrate to a fixed release
FortiPAM 1.0 1.0 all versions Migrate to a fixed release
FortiProxy 7.6 7.6.0 through 7.6.2 Upgrade to 7.6.3 or above
FortiProxy 7.4 7.4.0 through 7.4.3 Upgrade to 7.4.4 or above
FortiProxy 7.2 7.2 all versions Migrate to a fixed release
FortiProxy 7.0 7.0 all versions Migrate to a fixed release
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Acknowledgement

Fortinet is pleased to thank Vang3lis and Cyth from VARAS@IIE for reporting this vulnerability under responsible disclosure.

Timeline

2025-10-14: Initial publication