PSIRT Advisories

FortiClient local privilege escalation exploit chain


A researcher has disclosed several vulnerabilities against FortiClient for Windows, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows.

Affected Products

FortiClient for Windows (6.0.4 and earlier)


It is advised that all customers update their Vulnerability Scan engine to v2.00027 or later to protect against this vulnerability.  In FortiClient -> About -> Engines -> Vulnerability, ensure version is 2.00027 or greater.  The engine update will be pushed automatically to all FortiClients.

Upgrade to FortiClient 6.0.5.


Fortinet thanks Kevin Joensen from Secu A/S for reporting this vulnerability.