#VU122534 Link following in Fortinet FortiClient for Windows - CVE-2025-62676

 

#VU122534 Link following in Fortinet FortiClient for Windows - CVE-2025-62676

Published: February 10, 2026 / Updated: February 19, 2026


Vulnerability identifier: #VU122534
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2025-62676
CWE-ID: CWE-59
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Fortinet FortiClient for Windows
Software vendor:
Fortinet, Inc

Description

The vulnerability allows a local authenticated user to damange or delete data.

The vulnerability exists due to improper link resolution before file access ('link following') in FCConfig. A local low-privilege attacker can perform an arbitrary file write with elevated permissions via crafted named pipe messages.


Remediation

Install update from vendor's website.

External links