Логотип exploitDog
bind:CVE-2025-47761
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-47761

Количество 3

Количество 3

nvd логотип

CVE-2025-47761

3 месяца назад

An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-j48r-9cxh-ccpx

3 месяца назад

An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-14867

3 месяца назад

Уязвимость средств защиты Fortinet FortiClientWindows, связанная с открытым IOCTL с недостаточным контролем доступа, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-47761

An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection.

CVSS3: 7.8
0%
Низкий
3 месяца назад
github логотип
GHSA-j48r-9cxh-ccpx

An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection.

CVSS3: 7.8
0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-14867

Уязвимость средств защиты Fortinet FortiClientWindows, связанная с открытым IOCTL с недостаточным контролем доступа, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
0%
Низкий
3 месяца назад

Уязвимостей на страницу