An Improper Link Resolution Before File Access ('Link Following') vulnerability [CWE-59] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.4, FortiClientWindows 7.2.0 through 7.2.12, FortiClientWindows 7.0 all versions may allow a local low-privilege attacker to perform an arbitrary file write with elevated permissions via crafted named pipe messages.

Project Subscriptions

Vendors Products
Fortinet Subscribe
Forticlientwindows Subscribe
Advisories

No advisories yet.

Fixes

Solution

Upgrade to upcoming FortiClientWindows version 8.0.0 or above Upgrade to FortiClientWindows version 7.4.5 or above Upgrade to FortiClientWindows version 7.2.13 or above


Workaround

No workaround given by the vendor.

History

Tue, 10 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description An Improper Link Resolution Before File Access ('Link Following') vulnerability [CWE-59] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.4, FortiClientWindows 7.2.0 through 7.2.12, FortiClientWindows 7.0 all versions may allow a local low-privilege attacker to perform an arbitrary file write with elevated permissions via crafted named pipe messages.
First Time appeared Fortinet
Fortinet forticlientwindows
Weaknesses CWE-59
CPEs cpe:2.3:a:fortinet:forticlientwindows:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.10:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.11:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.12:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.13:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.14:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.10:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.11:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.12:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.2.9:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientwindows:7.4.4:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet forticlientwindows
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-02-11T04:56:21.401Z

Reserved: 2025-10-20T08:07:37.651Z

Link: CVE-2025-62676

cve-icon Vulnrichment

Updated: 2026-02-10T16:33:47.954Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-10T16:16:09.260

Modified: 2026-02-10T21:51:48.077

Link: CVE-2025-62676

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-10T21:42:05Z

Weaknesses