CVE-2026-24018

CWE-615 documents5 sources
Severity
7.8HIGH
EPSS
0.0%
top 95.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 10

Description

A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLinux 7.4.0 through 7.4.4, FortiClientLinux 7.2.2 through 7.2.12 may allow a local and unprivileged user to escalate their privileges to root.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5fortinet/forticlientlinux7.4.07.4.4+1
NVDfortinet/forticlient7.2.27.2.13+1

🔴Vulnerability Details

2
CVEList
CVE-2026-24018: A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLinux 72026-03-10
GHSA
GHSA-g7vg-vfvv-mr49: A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLinux 72026-03-10

📋Vendor Advisories

1
Fortinet
Local privilege escalation via improper symlink following2026-03-10

🕵️Threat Intelligence

1
Wiz
CVE-2026-24018 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-24018 (HIGH CVSS 7.8) | A UNIX symbolic link (Symlink) foll | cvebase.io