Description
A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLinux 7.4.0 through 7.4.4, FortiClientLinux 7.2.2 through 7.2.12 may allow a local and unprivileged user to escalate their privileges to root.
Published: 2026-03-10
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

FortiClientLinux contains a flaw where the application follows symbolic links without proper checks. An authenticated, unprivileged local user can exploit this behaviour to gain root privileges. The weakness is classified as CWE-61, reflecting incorrect handling of path traversal through symlinks.

Affected Systems

Fortinet FortiClientLinux on Linux operating systems is affected. The vulnerability exists in versions 7.4.0 through 7.4.4 and in 7.2.2 through 7.2.12. Users running any of these releases should verify the current installed version against the list above.

Risk and Exploitability

CVSS score is 7.4 indicating high severity. The EPSS indicates low exploitation probability (< 1%). The vulnerability is local, requiring the attacker to have a user account on the same host. No public exploit is reported and it is not listed in the CISA Known Exploit Catalog. However, because privilege escalation to root can enable arbitrary system changes, the risk remains significant for any machine with exposed local users. The official recommendation is to apply a patch that removes the insecure symlink handling.

Generated by OpenCVE AI on April 16, 2026 at 09:45 UTC.

Remediation

Vendor Solution

Upgrade to upcoming FortiClientLinux version 8.0.0 or above Upgrade to FortiClientLinux version 7.4.5 or above Upgrade to FortiClientLinux version 7.2.13 or above


OpenCVE Recommended Actions

  • Upgrade FortiClientLinux to version 8.0.0 or later.
  • If version 8.0.0 is unavailable, upgrade to 7.4.5 or later.
  • If that is not possible, upgrade to 7.2.13 or later.

Generated by OpenCVE AI on April 16, 2026 at 09:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title Unix Symlink Follow Vulnerability Allows Local Privilege Escalation

Fri, 13 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet forticlient
CPEs cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*
Vendors & Products Fortinet forticlient

Wed, 11 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Description A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLinux 7.4.0 through 7.4.4, FortiClientLinux 7.2.2 through 7.2.12 may allow a local and unprivileged user to escalate their privileges to root.
First Time appeared Fortinet
Fortinet forticlientlinux
Weaknesses CWE-61
CPEs cpe:2.3:a:fortinet:forticlientlinux:7.2.10:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.2.11:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.2.12:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.2.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.2.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.2.9:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:forticlientlinux:7.4.4:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet forticlientlinux
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C'}


Subscriptions

Fortinet Forticlient Forticlientlinux
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-03-11T13:08:18.944Z

Reserved: 2026-01-20T11:13:10.549Z

Link: CVE-2026-24018

cve-icon Vulnrichment

Updated: 2026-03-11T13:02:48.652Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T18:18:17.560

Modified: 2026-03-13T19:04:40.047

Link: CVE-2026-24018

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:45:31Z

Weaknesses