| CVE ID | CVE-2025-62676 |
| CVSS SCORE | 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| AFFECTED VENDORS |
Fortinet |
| AFFECTED PRODUCTS |
FortiClient VPN |
| VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of Fortinet FortiClient VPN. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the FortiClient Configuration Daemon. By creating a junction, an attacker can abuse the service to overwrite arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. |
| ADDITIONAL DETAILS |
Fortinet has issued an update to correct this vulnerability. More details can be found at:
https://fortiguard.fortinet.com/psirt/FG-IR-25-661 |
| DISCLOSURE TIMELINE |
|
| CREDIT | Alexander Staalgaard |