No advisories yet.
Solution
Upgrade to upcoming FortiClientWindows version 8.0.0 or above Upgrade to FortiClientWindows version 7.4.5 or above Upgrade to FortiClientWindows version 7.2.13 or above
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-661 |
|
Tue, 10 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Link Resolution Before File Access ('Link Following') vulnerability [CWE-59] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.4, FortiClientWindows 7.2.0 through 7.2.12, FortiClientWindows 7.0 all versions may allow a local low-privilege attacker to perform an arbitrary file write with elevated permissions via crafted named pipe messages. | |
| First Time appeared |
Fortinet
Fortinet forticlientwindows |
|
| Weaknesses | CWE-59 | |
| CPEs | cpe:2.3:a:fortinet:forticlientwindows:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.10:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.11:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.12:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.2.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientwindows:7.4.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet forticlientwindows |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2026-02-11T04:56:21.401Z
Reserved: 2025-10-20T08:07:37.651Z
Link: CVE-2025-62676
Updated: 2026-02-10T16:33:47.954Z
Status : Awaiting Analysis
Published: 2026-02-10T16:16:09.260
Modified: 2026-02-10T21:51:48.077
Link: CVE-2025-62676
No data.
OpenCVE Enrichment
Updated: 2026-02-10T21:42:05Z