Fortinet FortiClient Windows: Info Disclosure via Port 8053 (7.2.0-7.2.1)
CVE-2025-24473 Published on May 28, 2025
A exposure of sensitive system information to an unauthorized control sphere vulnerability in Fortinet FortiClientWindows 7.2.0 through 7.2.1, FortiClientWindows 7.0.13 through 7.0.14 may allow an unauthorized remote attacker to view application information via navigation to a hosted webpage, if Windows is configured to accept incoming connections to port 8053 (non-default setup)
Vulnerability Analysis
CVE-2025-24473 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity and availability.
Weakness Type
Exposure of Sensitive System Information to an Unauthorized Control Sphere
The application does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the application does.
Products Associated with CVE-2025-24473
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-24473 are published in these products:
Affected Versions
Fortinet FortiClientWindows:- Version 7.2.0, <= 7.2.1 is affected.
- Version 7.0.13, <= 7.0.14 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.