CVE-2025-47761

Source
https://cve.org/CVERecord?id=CVE-2025-47761
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-47761.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-47761
Published
2025-11-18T17:16:02.413Z
Modified
2026-03-13T00:52:44.977430Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition, it requires a valid and running VPN IPSec connection.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-47761.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "7.2.0"
            },
            {
                "fixed": "7.2.10"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "7.4.0"
            },
            {
                "fixed": "7.4.4"
            }
        ]
    }
]