Forticlientmac Fortinet Forticlientmac

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Fortinet Forticlientmac.

By the Year

In 2026 there have been 0 vulnerabilities in Fortinet Forticlientmac. Last year, in 2025 Forticlientmac had 3 security vulnerabilities published. Right now, Forticlientmac is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 3 6.43
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 1 7.50

It may take a day or so for new Forticlientmac vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Fortinet Forticlientmac Security Vulnerabilities

FortiClient MacOS Improper Sig Verif CVE202546774 7.4.2/7.2.9 Escalates Privs
CVE-2025-46774 6.8 - Medium - October 14, 2025

An Improper Verification of Cryptographic Signature vulnerability [CWE-347] in FortiClient MacOS installer version 7.4.2 and below, version 7.2.9 and below, 7.0 all versions may allow a local user to escalate their privileges via FortiClient related executables.

Improper Verification of Cryptographic Signature

FortiClientMac 7.2.1-7.4.3 Code Injection via Malicious Webpage
CVE-2025-31365 5.5 - Medium - October 14, 2025

An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientMac 7.4.0 through 7.4.3, 7.2.1 through 7.2.8 may allow an unauthenticated attacker to execute arbitrary code on the victim's host via tricking the user into visiting a malicious website.

Code Injection

FortiClientMac 7.0-7.4.3 Local RCE via LaunchDaemon Hijack
CVE-2025-57741 7 - High - October 14, 2025

An Incorrect Permission Assignment for Critical Resource vulnerability [CWE-732] in FortiClientMac 7.4.0 through 7.4.3, 7.2.0 through 7.2.11, 7.0 all versions may allow a local attacker to run arbitrary code or commands via LaunchDaemon hijacking.

Incorrect Permission Assignment for Critical Resource

A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may
CVE-2021-41028 7.5 - High - December 16, 2021

A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.

Use of Hard-coded Credentials

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Fortinet Forticlientmac or by Fortinet? Click the Watch button to subscribe.

Fortinet
Vendor

subscribe