CVE-2025-46373

A Heap-based Buffer Overflow vulnerability [CWE-122] in Fortinet FortiClientWindows 7.4.0 through 7.4.3, FortiClientWindows 7.2.0 through 7.2.8 may allow an authenticated local IPSec user to execute arbitrary code or commands via "fortips_74.sys". The attacker would need to bypass the Windows heap integrity protections
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*

History

20 Nov 2025, 14:35

Type Values Removed Values Added
First Time Fortinet
Fortinet forticlient
References () https://fortiguard.fortinet.com/psirt/FG-IR-25-125 - () https://fortiguard.fortinet.com/psirt/FG-IR-25-125 - Vendor Advisory
CPE cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*

18 Nov 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-18 17:16

Updated : 2025-11-20 14:35


NVD link : CVE-2025-46373

Mitre link : CVE-2025-46373

CVE.ORG link : CVE-2025-46373


JSON object : View

Products Affected

fortinet

  • forticlient
CWE
CWE-122

Heap-based Buffer Overflow