A Heap-based Buffer Overflow vulnerability [CWE-122] in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.8 may allow an authenticated local IPSec user to execute arbitrary code or commands via "fortips_74.sys". The attacker would need to bypass the Windows heap integrity protections
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-125 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2025, 14:35
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Fortinet
Fortinet forticlient |
|
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-25-125 - Vendor Advisory | |
| CPE | cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* |
18 Nov 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 17:16
Updated : 2025-11-20 14:35
NVD link : CVE-2025-46373
Mitre link : CVE-2025-46373
CVE.ORG link : CVE-2025-46373
JSON object : View
Products Affected
fortinet
- forticlient
CWE
CWE-122
Heap-based Buffer Overflow
