No advisories yet.
Solution
Upgrade to upcoming FortiClientLinux version 8.0.0 or above Upgrade to FortiClientLinux version 7.4.5 or above Upgrade to FortiClientLinux version 7.2.13 or above
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-26-083 |
|
Wed, 11 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLinux 7.4.0 through 7.4.4, FortiClientLinux 7.2.2 through 7.2.12 may allow a local and unprivileged user to escalate their privileges to root. | |
| First Time appeared |
Fortinet
Fortinet forticlientlinux |
|
| Weaknesses | CWE-61 | |
| CPEs | cpe:2.3:a:fortinet:forticlientlinux:7.2.10:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.2.11:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.2.12:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.2.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.2.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.2.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.2.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.2.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientlinux:7.4.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet forticlientlinux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2026-03-11T13:08:18.944Z
Reserved: 2026-01-20T11:13:10.549Z
Link: CVE-2026-24018
Updated: 2026-03-11T13:02:48.652Z
Status : Received
Published: 2026-03-10T18:18:17.560
Modified: 2026-03-10T18:18:17.560
Link: CVE-2026-24018
No data.
OpenCVE Enrichment
Updated: 2026-03-11T11:49:29Z