{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-47761","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2025-05-09T14:40:26.906Z","datePublished":"2025-11-18T17:01:11.767Z","dateUpdated":"2026-01-14T09:17:43.864Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiClientWindows","cpes":["cpe:2.3:a:fortinet:forticlientwindows:7.4.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.4.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.4.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.4.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.2.9:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.2.8:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.2.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.2.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.2.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.2.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.2.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.2.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.2.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientwindows:7.2.0:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"7.4.0","lessThanOrEqual":"7.4.3","status":"affected"},{"versionType":"semver","version":"7.2.0","lessThanOrEqual":"7.2.9","status":"affected"}]}],"descriptions":[{"lang":"en","value":"An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver.  Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2026-01-14T09:17:43.864Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-782","description":"Execute unauthorized code or commands","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:X/RC:R"}}],"solutions":[{"lang":"en","value":"Upgrade to FortiClientWindows version 7.4.4 or above\nUpgrade to FortiClientWindows version 7.2.10 or above"}],"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-25-112","url":"https://fortiguard.fortinet.com/psirt/FG-IR-25-112"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-18T21:11:44.141602Z","id":"CVE-2025-47761","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-18T21:11:52.011Z"}}]}}