Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.8
Fortinet FortiClientLinux: Privilege Escalation through Symbolic Link Attack
CVE-2026-24018
Summary
A flaw in FortiClientLinux versions 7.4.0 to 7.4.4 and 7.2.2 to 7.2.12 could allow an ordinary user to gain full control of the system. This means that an attacker could potentially take control of your Linux system, which could lead to data theft, modification, or destruction. Update to the latest version to fix the issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| fortinet | forticlient | > 7.2.2 , <= 7.2.13 | – |
| fortinet | forticlient | > 7.4.0 , <= 7.4.5 | – |
Original title
A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLinux 7.4.0 through 7.4.4, FortiClientLinux 7.2.2 through 7.2.12 may allow a local and unprivileged user to escalate th...
Original description
A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLinux 7.4.0 through 7.4.4, FortiClientLinux 7.2.2 through 7.2.12 may allow a local and unprivileged user to escalate their privileges to root.
nvd CVSS3.1
7.8
Vulnerability type
CWE-61
Published: 10 Mar 2026 · Updated: 13 Mar 2026 · First seen: 11 Mar 2026